Fortune 500 Cyber Security Company
Fortune 500 Cyber Security Company
John, a 19 years old school boy, had a great interest in computers software.
He was doing software engineering. He spent days and nights on attaining
computer skills and in no time he was able to get great information about
computer software and programs. He started to work online for different IT
companies and his joys knew no bounds when he first time got his cheque
from a computer company. Soon he collected a handsome amount of
money which he wanted to use to improve their living standard.
One day when he entered the house, he heard her mother sobbing in her
bed. He went to her mom’s room and saw her mom, laying in the bed,
having tears in her eyes which were falling down on her cheeks.
“What happened mom”, he said to her while holding her hand
sympathetically.
“Nothing, son, don’t worry”, she said to john cleaning her tears with tissue
paper.
“Please tell me mom and don’t hide anything from me”, John said to her.
“I am terminated from my job”, she said in low voice.
“Why are you terminated?” John said again.
“Let me tell you in details. As you know, in this era, cyber security is one of
the major issue among all organizations of the globe. You know Fortune
500 Cyber Security Company, information security veterans, is one of the
best security company which comprises of cyber security professionals who
refined their craft securing DoD networks and communications and who
over the course of many years have dealt with diverse types of sophisticated
cyber adversaries and technical vulnerabilities. On the way, we combat the
same adversaries who symbolize the biggest threat to businesses and
government agencies today—advanced, sophisticated nation-state cyber
actors. This experience enables us to think like the adversary”, she said
while pouring some water into the glass.
After drinking water she said, “Our corporations are being assaulted but
our unique approach focused on active adversary pursuit and tailored cyber
operations made it impossible for attackers to steal the data. As a result, the
strategy for obtaining their most sensitive information must be as detailed
and relentless as the adversary’s pursuit of it. We harness decades of
training and experience to protect corporate networks from the inside. But
somehow the data was stolen due to my mistake”.
“How data was stolen due to you”? John said holding his head.
“My boss appointed a software engineer lady, Julia, few days ago. Soon we
became good friends. As you know my duty is to transfer and receive
payments from different organizations”, mother said looking at me.
“Yes I know you deal such things for a long time”, John said.
“One day I was working on my computer. Her desk was behind me and she
could see my computer to some extent. I was transferring payments to my
clients. My boss called me in his office to discuss something”, she said to
John keeping her hand on his shoulder.
“What happened then”? John said holding her hand.
“When I came back, she was sitting on my computer but when she saw me
she left the computer saying I came to switch off the computer”, the mother
said and went to her seat keeping her eyes off. Once again tears were falling
from her eyes. John went near to her and said, “Don’t worry mom but tell
me the whole incident”?
Mother said,” I don’t pay much attention to her but next day when I
checked the balance of the company, one million dollars were deducted
from the account and was transferred to some unknown account”.
“The software engineer was also absent on that day. I told my boss about
the issue because there was the possibility of loss and transfer of
confidential data and information of the company. We were also working
for the national defence and security forces, in fact, it was a joint project of
defence IT department with our company. He contacted the police and
when police went to her house, she was found dead in her bed room, and I
was terminated due to lack of responsibility” mother said in sad tone.
“I have saved some money which I earned through internet and I haven’t
told you yet. We will use that money to run our house and don’t worry I will
find job myself,” John said.
“No son, I will find work, you should concentrate on your studies and on
your project, “mother said to John.
After few weeks John passed software engineering. One day John saw job
opportunity in the same company in the newspaper. He decided to apply
for the job so he could find the anymore suspects there who might be
involved in the fraud.
Few days later, he got a call from the company for the interview. John
appeared for the interview and was selected for the job. After two weeks his
job started. It was a big web security company, more than he was expecting.
The infrastructure was beautifully designed and maintained. He worked
very hard and within few weeks his managers started to appreciate his
performance and innovative techniques in the company.
One day his boss called him to his office with all IT professionals. Boss told
them the whole incident which his mother told him. The company was in
trouble because despite some money was stolen, many confidential
information about the company, the breach was believed to be the largest
theft of personal data from a major technology company ever and
information of clients was also leaked which was damaging the reputation
and credibility of the company. Few companies had cancelled the
agreement, and few companies had sued against the security company for
their losses. So company was overall facing a very hard time due to loss of
data. Hackers who stole the data and information about the company and
clients, might spoil the reputation of the company.
Boss said, “Hackers may have the physical access to the machine which is
the duty of datacenter provider. He is also responsible for the second layer
of the security which is local network around the physical machine which
comprises of routers, load balancers and other networking tools”.
The boss turned on the LED and showed the slides and said, “The attack
may be on then on Virtualization layer that exists between users and the
operating system. It is the responsibility of the host to maintain it. One of
the responsibility of the host is to maintain Virtual Operating System too.
Server and Server Management is also an important for the company
because the hackers will, definitely want to control the softwares installed
on the server. After this is the Site Management as hackers will definitely
want to have access to CMS like Wordpress and Joomla etc. But this is the
most vulnerable action as it is directly related to public. Ultimately hackers
may have access to users and they can steal credit/debit/master cards
information, passwords and some very important and confidential data.”
Boss said again looking at them, “What steps we should take to make our
security system better”?
David, one of the manager, said, “I think we should give two days training
to our IT professionals to boost their abilities and skills. Surely, it will incur
some cost but it will bring very fruitful results in the future”.
“We need to make our security better, both the company security and
security of IT department and web security”, the security officer said.
“Sir, I would like to watch all the activities on security cam on those dates
when the security problems happened”, John said.
“Definitely, you can see all activities on security cam, though it’s the
responsibility of security officers but you can do whatever you think is best
for the security of the company”, boss said with a smile.
“I will make our security system better by getting latest technologies and
installing them to build a fool-proof web security system”, information
security analyst said with determination.
“We need to update our system, change passwords and CMS setting, update
extensions, backups, server configuration files etc. we will also prevent
directory browsing, image hotlinking and protect sensitive files and
installing SSL with most sophisticated ways. We will also patch our end-
point machines, restrict files download, scanning with multiple scan
engine, invest in a latest generation firewall, Monitor uploads and
upstreams to suspicious geographic IPs, or large upstreams which may
indicate a botnet infection and make a policy where only users can use
secure web browsers”, IT security manager said.
“I also want to tell all of you that a separate hack occurred around August
that leaked the data of one million users which is triple the record-breaking
hack from July. The one threat that is more severe than any other is the
lethal malware encrypts your files and then holds them hostage, demanding
payment mostly in Bitcoin before it decrypts the stuff,” boss said showing
the slides on LED. We also come to know that the botnet that destroyed the
DNS havoc consisted of about 100,000 household devices such as webcams
and DVRs infected with the malware. Due to which a large number of
internet devices attacked the web.
After the meeting, John went to the security room to watch the activities on
the security cam. He saw the software engineer on cam who was murdered.
He saw her passing by the server, she dropped her purse there on the floor,
she sat down to hold the purse but she took out a gadget from the purse and
fixed it on the back of computer system with a data cable. It seemed that
she transferred some data from the computer to her gadget and then put
back the gadget in her purse and went away.
This proves that his mother was not responsible for stealing of confidential
data, in fact, it was stolen from the server but the same woman did so who
was suspicious. John was not only mentally active but physically he was
also very active boy and he was the best scout and sportsman in during his
schooling. He decided to do something for his company as well for his
mother.
He decided to go to the flat of murdered woman to get some information
about her. On Saturday morning, he left his house early in the morning and
went straight to the flat. First of all he asked the security guard about the
activities of woman. The security guard was not willing to give any kind of
information about the woman, but John told him that he is a cop and he is
investigating the murder of the woman. The security guard told him that a
man and a woman often came to see her, they were always holding a
computer bag with them. They always came in Mercedes at night. It seems
that they work together for some common purpose. The security guard also
told their complete description and they were about 35 years old or so.
John wanted to check the flat by himself. He got a master key from one of
his friend who would make keys. Then next day he went to the flat, he
opened the door with the master key and entered the flat. The flat was
nicely decorated with a lots of picture hanging on the walls. He went to the
bedroom and searched the room. He couldn’t find anything special but he
saw a web address https://www.programmers.com written in one of the
drawer. He noted the web address and left the flat.
On reaching home, he checked the website, it was full of programming
techniques. It was a good site to attain knowledge for programmers and
software engineers. He examined the site deeply to find any clue which
could be helpful for him but he couldn’t. He saw few photos of employees at
the site including CEO and some other officials.
Next day, he went to a restaurant for coffee. Suddenly two men started
fighting with each other. John felt like he has seen the man somewhere.
Both men were using harsh words and left the restaurant. John came
outside following one of the man. The man got in a car, John also took his
car and started to follow him. He went to posh area and entered a beautiful
house. John went back home, thinking where he has seen this guy.
Next day he went to office, in the break time, he saw the site again. He
could see the photo of same man was there on that site. He decided to keep
an eye on that man. Two days later, he awoke early in the morning and
went straight to that man. After an hour, the man came out of the house in
his car. John followed him and the man was going on the highway. After 15
minutes of drive, he turned to the right side on the road and parked his car
outside a modern and sophisticated building. The man went into the house.
John got off the car and went behind the building. There was fence all
around the building. He went close to a window and peeped into the house
through the window. It was a big room with many computers and two men
were there on the computers. The man whom John followed was in his
glass cabin. He was the manager and his name was written as Kevin on the
glass door. It seems that they were running a computer business with latest
technology. He checked all windows one by one. He saw the dog with a
beautiful collar around his neck. It is Kevin’s dog whom he always took with
him. He has seen this dog in Kevin’s house too. He was getting late for the
office so he left and went to his office.
He kept thinking about Kevin and his business all the day in the office too.
He went to his boss and told him the whole incident and requested boss to
provide him some latest mic technologies so he might get to know more
about Kevin and his business which might be related to their company.
Boss really appreciated John for his efforts to track the hackers. Boss
provided him micro cam, mic within a small chip which could work exactly
like the latest computer technology.
In the evening, John went there again. The security guard was there on the
front of the building. He, once again, went to backyard of the building. He
saw the dog was there in one of the room. The dog saw him and came near
to the windows. John put some meat in front of the dog which he ate. He
fixed the chip in the collar of the dog and went back to the car. He opened
the brief case which was in fact a computer machine with LED that was
connected to the chip which was fixed in the dog’s collar. He established the
connection with the microchip. He could see the room where dog was
sitting. Kevin was also there, working on the computer. John started the car
and went back to his home.
At home, he took the shower and his mom was waiting for him for dinner
on the dining table. He always has after dinner chat with her mom. John
told that his company is trying to find hackers and soon they will be able to
track them. He also told his mom some details about Kevin and his
business.
“Be careful son, such people are very dangerous because they have always
connected with bad people and there are groups of such people who help
them and support them”, mom said with some expression of worries on her
face.
“Don’t worry mom, I know very well and I am very careful”, John said while
standing up from the dining table and went to bed. He was so much
involved in this situation that his night was full of dreams about Kevin and
his business. He awoke at midnight, he turned on the computer machine to
see what is happening but he saw nothing but dim light in the room. It
seems that everybody was asleep. He turned off the computer and went to
bed once again.
Next morning, he connected his Bluetooth device with the computer and
went out for running. He didn’t want to miss anything so he fixed Bluetooth
earphone in his ears and went for exercise. After few minutes he heard
“Come on Joe lets go for a walk”, Kevin said to his dog. He didn’t hear
anything specific because they went out for a walk.
After an hour, John left for his office and he kept checking if he could hear
something important. He saw car which meant they might be going to
work. Kevin was on call with someone named Amanda. They were talking
about some software and programming issues. They also wanted to hire
more software developers to expand their business. So far their
conversation didn’t give any clue which might show their involvement in
some illegal activities but John sixth sense was compelling him to keep an
eye on them.
Fortune 500 cyber Security Company was constantly confronting breaches
due to hacking of website that was why John wanted to find trackers as
soon as possible. This was definitely due to internal attack that was a great
threat to data and system which was caused due to Julia, the software
engineer. The security team identified all privileged accounts and
credentials and terminated them immediately to mitigate the risk.
Employees were using strong passwords for all devices that have
combination of upper and lowercase letters, numbers and symbols. The
security team also deployed validated encryption as part of company’s
security strategy. In case if the employees have forgotten precautions to
lock their phone, IT security department can execute a selective wipe by
revoking the decryption keys used for the company data. Introduction of
BYOD policy mitigate the chances of hacking companies can better monitor
email and documents which are being downloaded to company. Fortune
500 cyber Security Company was also trying to mitigate BYOD risk by
hybrid cloud. There were some reports from national defence and security
organization about the stealing of some of confidential data which was
definitely an outcome of that incident.
John didn’t find anything special on that day. When he came back home, he
searched hacking techniques to hack sites and systems both internally and
externally. He also searched for all the sites, malwares and companies
which were indulged in hacking. He had been constantly checking Kevin’s
activities too but nothing special he noticed yet. He once again searched the
site and found it kept information about every employee online with their
skills, experience and qualification. He found that Kevin is a senior
software engineer and programmer, gold medalist, graduated from the best
university of the world.
He had been working in leading software and web security companies. His
teachers and professors were always surprised to see his expertise in
programming and called him a genius in the university. He got a call from
his boss when he was reading about Kevin. Boss was worried because
national defence and security organization just told that some hackers were
trying to break into their activities. They were affecting the nuclear
processes. Neutrons were absorbed by cadmium rods and by heavy water
which was controlled by software technology. But hackers tried to hinder
these processes and it could be very dangerous. It might have been resulted
in chain fission reaction which could explode the whole atomic reactor with
nearby places. They were not happy with our security company due to this
kind of security lapse. So we were thinking to send our IT experts to
national defence computer department, so they could recheck the whole
system and apply necessary precautionary measures to make it fool-proof.
“You will go with the team to inspect everything deeply and learn and gain
more experience to tackle such situations in future,” boss said to John.
“We should also tell them about Kevin. May be we can find a good
solution”, John said.
“Yes, definitely we will discuss all aspects with them and get ready
tomorrow at 11 pm to go with the team”, boss said to John.
“Yes I will get ready at that time”, John said.
“We will discuss it again after the visit of our team, Ok bye”, boss said.
Next day John with his team went to national defence and security center.
It was a modern building equipped with the latest technologies, John was
very impressed by their system. The modern and sophisticated technologies
and devices fascinated him and he observed everything with full
consideration. The joint team scrutinized everything skillfully to eradicate
any possibility of hacking onwards. Colonel Mike was the head of IT
security department. He was tall, strong and software engineer as well as a
computer engineer. He was a great disciplinarian and never compromised
on discipline. Then we went to research department, major Jacob described
the research activities in the department specially to keep our program safe
from hackers attack. John also discussed the information about Kevin
which he got from different resources. So now he was under observation of
security forces.
After the visit, we returned to our office in the evening. John was still
pondering how hackers could break into the system despite the perfect
security system. There must be some internal conspiracy to hack such a
perfect system or in this office some other people might be engaged in this
hacking.
Next day, boss called for the meeting again and told them there were
complaints from some other companies and websites too about hacking.
Some unusual things were happening which was pointing towards hacking.
We had to make all our clients happy by providing them fool-proof web
security system. One of our clients was an insurance company which was
facing few problems in their online financial management system. It has
plans in many countries in American and Europe. Many other companies
were also attacked by they didn’t notice it. Their clients’ accounts were
being hacked many times and some funds were withdrawn from the bank
by hackers. The security company informed clients about the breach and
offered the customers free identity theft protection and credit monitoring
for the whole year. The breach mainly affected the residents of America and
Europe. This breach was the massive attack ever reported in this decade. It
seems they had access to clients’ social security numbers, phone and
cellphone numbers, names, and addresses, date of births, financial
information, and insurance claims.
“What steps you are taking to ensure web security, David”, boss said to
David.
“I am implementing many steps to ensure web security using latest
programing techniques to avoid SQL injection, Inclusion Vulnerabilities,
cross-site scripting, and we always ensure encrypted login pages, validation
on server side, encrypted connections, strong, cross-platform compatible
encryption, key-based authentication over password authentication, secure
workstation and redundancy to protect the Web site. We are doing all this
with latest technologies and techniques and checking the system every
minute now”, David said.
“Government is also keen to ensure security of their confidential data
because cyber-attacks are becoming more frequent nowadays which may be
a threat to the integrity of a country. National and provincial governments
are organizing meetings to implement necessary precautionary measures to
stop cyber-attacks,” boss said.
“Government has also informed that these cyber-attacks are being launched
from Central Europe so Government decided to send a team of IT and Web
Security experts and CIA to go there to find hackers and arrest them”, boss
briefed them.
“Mr. David and Mr. John will go with this team because Mr. David has vast
experience and everyone is familiar with his expertise in the field of
software and web development as well in web security. Mr. John is young
and energetic man who has good knowledge of IT, hacking and web
security. And he is physically very strong and active like a military officer.
So these are our best available choices for the team. Your passport, visa and
all documents are ready, you can collect them from the office”, boss
described everything in detail.
John and David went to the office after the meeting, and collected passport,
visa and required documents from the office. Their flight was on the next
day. John was very excited because he always wanted to be engaged in
some kind of military activities. There were five members in the team, they
are John, David, Colonel Mike, Major Jacob and a military engineer Smith.
Mr. Smith was also a smart engineer, he was about 32 years old. They left at
12:00 am at night, Mr. Smith’s seat was with John. John really enjoyed
Smith’s company as he was very intelligent and humorous man. He related
many anecdotes, John could hardly control his loud laughter. It took about
10 hours to reach them.
They were received by Mr. Keith, local administrator of Fortune 500 cyber
Security Company. He took them to a nice bungalow in the heart of the
city. It was nicely decorated and full equipped with latest technologies and
computer system. Security cams, hidden microphones were fixed all around
the building. They took rest for few hours before starting their mission. All
of them had sound sleep due to nice weather and pleasant atmosphere.
They slept about 6 hours and after breakfast they inspected the computer
systems, machines and latest technologies installed in the building. They
could see and observe all major parts of the city from the control room with
sophisticated cams. While they were discussing hacking, Colonel Mike got
a call from Head office. They sent an email containing information about
some suspicious hacking activities with the possible names and addresses
of hackers. Hackers were constantly changing their IP addresses that’s why
it was not possible to find them easily. But there was one IP address which
was often reported by the team.
When Colonel Mike was pondering over that IP address, john came near to
Colonel Mike and told him that he had noticed an IP address and showed
the IP address. It was the same IP address which Colonel Mike noticed. He
agreed that they should trace the person on this IP address. They traced the
address of the building and ready to go there. Major Jacob was also going
with them. It took them 25 minutes to reach there. It was a commercial
building, with many offices but there was only one software company there
in that building. The security guard stopped them on the gate and checked
their passport etc. before allowing them to enter the software company.
They reached the counter where there was a girl who said to them, “How
may I help you sir”?
“We want to meet the manager”, Colonel Mike said to her calmly.
“Do you have any appointment, sir”? She said looking at her computer.
“No, but we want to purchase some softwares for our company”, Colonel
said to her while examining the people around there.
“Let me ask my boss”, she said picking the phone and called her boss.
“Ok sir, you may go there. Please go straight and then turn left, there is the
manager’s room”, she said.
“Thank you ma’am, you are so nice”, Colonel said and they all went straight
and then turned to left.
There was the manager’s room, they entered the room. It was a beautifully
decorated room. The manager was about 40 years old a very strong black
man. The manager shook hands with us one by one and then we sat down
discussing few things about software. This was a well-reputed software
company comprising of large number of employees. It has its offices world-
wide. During discussion, John dropped his pen from his hand where his
bag was lying on the carpeted. He immediately fixed the device in the port.
It automatically detected the Wi-Fi password and connected through
internet. It was Smith’s idea and he was checking the computer by his
cellphone and no one could ever doubt him. We left after twenty minutes.
At the gate, John stopped and told his comrades that he would come in a
minute. So they went to their car and John gave security guard his beautiful
watch and asked him if there was someone who could help him in hacking.
The security guards was reluctant but due to expensive watch, he told him
about few senior software experts in the company who were indulged in
some sort of hacking. John took their cell phone number from the security
guard and departed. On the way he told Colonel Mike and Major Jacob
about the whole conversation. That was a good move, in this way hackers
could be tracked easily.
In the evening, Smith was still checking his cell phone so he might get some
information about hackers. Then John called at one of the cell phone
number he got from the security guard. It was Mr. Bacon. John discussed
few things about software and web development and offered him a very
good price for making a software. Mr. Bacon was very happy because he
thought he was going to have five times more price than the original price.
John also planned to offer him hacking task but he thought it would be
better to offer him after few calls when he would be more familiar with him.
Next day, they all planned to get to hackers through bacon. John, once
again, called him and after some formal conversation and discussing
software project, John offered him to work as hacker for him. John offered
a great amount to do so but Bacon was not willing to do such a thing. Even
he refused that he could hack a site or program. John was trying to tempt
him in different ways but in vain. After the call, major Jacob said, “We
should follow him wherever he goes and we should watch him all the time.
“Yes, that’s how we can find some evidences and accomplish our mission”,
Smith said. “I think we should fix a cam on Bacon’s car, one in the car and a
tracker so we should know his location”, Colonel Mike said.
“Yes, that’s a good idea. Tonight we will go to Bacon’s home and fix cam
and tracker in his car as well in the house.
At night, they went to Bacon’s house. His car was in the porch. Mr. Smith
fixed the tracker but he couldn’t open the car to fix cam inside the car.
Bacon was asleep in his room. John opened the glass window and entered
the room. He fixed one camera in the bed room and other in the lounge
which can cover almost all parts of the house. After fixing cam and tracker
they came back home at midnight. At home, they checked cameras and
tracker, everything was working fine. They could see Bacon sleeping in his
bed. Then they went to bedroom and fell asleep soon.
Next morning, when John awoke, he saw Mr. Smith sitting on computers.
John went to bathroom and took shower. After shower, he sat beside Mr.
Smith. “What’s up Mr. Smith”, John said to Smith. “I have hacked Bacon’s
computer and trying to access confidential documents”, Mr. Smith said
with a smile.
“That’s good. I hope we can find something important by hacking his
computer”, John said excitingly.
Smith saw bacon in the TV lounge on phone. He was talking about hacking
and controlling about the nuclear power plant. It was United States power
plant which was the target of Bacon. Smith was shocked to hear all the
conversation. Bacon wanted to launch the chain reaction in the nuclear
reactor. It would cause an immense destruction if he would be able to
launch chain reaction. Bacon said, “I am coming to you within an hour to
make a plan to destroy nuclear plant”. Bacon ended the call and got ready
to leave for the meeting.
Smith told Mr. Mike and Jacob about the whole conversation which he
heard with the help of cam and mic fixed on Bacon’s house. They all got
ready and kept weapons with them and departed in about 5 minutes. Mr.
Smith was checking Bacon on cam. Bacon was getting into his car and he
started his car and he was going towards north. Smith was watching his
location with the help of tracker and telling John everything who was
driving car. “John, drive fast we need to catch him”, colonel Mike said to
John looking out of window. John accelerated the speed and soon they
were behind Bacon’s car. Bacon took his car into a big house. John parked
his car near the trees and they got off the car.
Major Jacob went at the gate with Colonel Mike. Major Jacob asked about a
fake address from the guard by showing an address written on the page. As
soon as guard looked at the paper, Colonel Mike fainted the guard with the
scientific device by touching it on guard’s neck. Major Jacob dragged the
guard into guar’s small cabin so that nobody could see him and they all
entered the house carefully. They heard the voices coming from a room.
Colonel Mike stopped near the windows and tried to hear the conversation.
They were talking about the nuclear plant. Colonel Mike tried to open the
window but it was closed. Major Jacob pushed the door and it was open.
He entered the room, no one was there. As soon as they all entered the
room, the door was shut automatically and iron grill covered the door. So it
was a trap and they were caught. They tried to break the iron grill but they
couldn’t.
Suddenly a voice came from some hidden microphone from the phone.
“Who are you? Why have you come here”, someone said to them on mic.
“We have come to purchase some software sir”, John said.
“How do you know we deal in softwares”, he said again.
“We know Bacon works in a software company and I speak to him
yesterday”, John said.
“This is not how to purchase a software. I know what you have done with
the guard. You think we are crazy”, he said in louder voice this time.
As Smith was an engineer, he was examining the electrical and mechanical
system of doors and windows with full consideration while they were
talking. Soon they heard some gas filling the room. Smith opened his bag
and he swiftly took out his tools and he set little explosive matter near the
door and the wall was exploded. Smith went near the wall and he could see
the wires coming out of the device fitted in the wall to open and close the
doors and grills. He peeled off the wire and as soon as he touched the wires
together the door opened and the grills were removed. They ran out of the
room but then laid down because enemies had opened the fire. They were
firing constantly on them but after a minute, firing was ceased. They
carefully went to the other room but nobody was there. They heard the
sound of cars so they ran towards the porch but the cars were gone. They
got into their car but realized the tyres of the car were burst. Bacon and his
companions had burst the tyres before their escape. They ran towards gate
to look for a taxi but when the taxi arrived, it was too late to chase them and
find them. Smith was tracking the car. It went to a new place almost outside
the city. But it seems that only Bacon had gone there as he couldn’t detect
any other car there with his car and soon his tracker also stopped working.
Perhaps someone had detected the tracker and switched it off but cam was
working fine. So they came back home. They were very tired and due to gas
they were feeling dizzy so they went to sleep soon.
At midnight, suddenly Colonel Mike awoke. He felt like someone broke into
their house. He took his gone and calmly saw through the door. There was
dim light in the TV lounge and pin-drop silence. He came in the TV lounge
carefully looking all around but he couldn’t see anyone. Suddenly someone
attacked him from behind, he wanted to hit his gun in Colonel Mike’s head
but Colonel bent down briskly and hit his elbow in the belly of the attacker.
That men fell down groaning with pain and colonel kicked his hand very
hard and the gun fell from his hand. Colonel picked up his gun but there
was another man who hit at Colonel’s head and Colonel fell down. Both the
gun dropped from Colonel’s hand. The man directed Colonel to keep his
hands up his head and got hold of both guns. There two more men who
came into the lounge through window. They were holding latest Kimber
K6s pistols. During this fight, John, Smith and Major Jacob were also
awoken. They could see the attackers with latest pistols. Their faces were
towards their rooms so they couldn’t attack from the front. Major Jacob
went out through the window in his room. He went to the roof, firmly fixed
a rope on the roof and took SIG MPX-C rifle in his hand. John and Smith
took their positions in their room so that they would attack altogether.
Major Jacob swang himself along the rope and broke into the room
breaking the window-pane. Attackers were not ready for this sudden attack
from behind. At the same time, John and Smith opened fire on the
attackers. Two of them was hit by the bullets on their chests and they fell
down. One of them jumped out of the window while opening fire on them.
John, Smith and Jacob fell themselves down to get themselves saved from
the firing. The third attacker ran out of the house and got into car. When he
was getting into the car, Colonel Mike shot at his leg and he got seriously
injured but he managed to escape. They all went behind him but once again
tyres were burst already by the attackers. So they couldn’t follow him. This
was second time, they couldn’t catch them.
Police arrived there soon and after investigation, they were set free.
They called their administrator and found a new place because this place
wasn’t safe now. This house was also equipped with latest technologies and
computers. Smith was trying to track the car. He was also observing
Bacon’s house but no one came there yet. He was also observing security
cams of their last house to find some clues about the attackers. Attackers
had covered their faces but in one of the recording one of the attacker’s face
was visible. This was the attacker who escaped from there and he was still
alive. Smith sent his picture to American office to find details about this
man.
PART 2
After thirty minutes, they got details about that man. His name was Kemp.
He was about 29 years old. He was in the security forces where he resigned
two years ago. After that it had been reported that he was involved in some
illegal activities. His current address was also given in the details. They
went to the address where an old woman opened the room. Colonel Mike
asked her about the Kemp. She was her mother. She told that Kemp came
now and then to see her often on weekends. Smith also put a cam in the
room so they might be aware of his arrival there.
On reaching home, Smith checked updates about Bacon and Kemp but
nothing was found yet.
Next day, they received a report from American office about hacking of
national defence system. Hackers once again interrupted the system and
endeavoured to explode the system. But national defence IT department
broke the hackers connection within few minutes otherwise it could have
been very dangerous. Hackers also tried to control lethal weapons and
missiles but timely intervention of IT department saved the system once
again.
Colonel Mike called the meeting and gave copies of report to everyone and
said, “Now it’s time to do some fast action because the delay in the action
may be resulted in a great devastation”.
At that time beep of Smith’s Tablet diverted the intention of everyone
towards Smith. Smith was looking at the Tablet. Kemp was there in the
room of her mother’s house. Smith told them and once again they were
travelling to Kemp’s mother house. When they reached near the house,
Kemp was getting off the steps of the house. He got into the car and Colonel
started to chase Kemp. After passing through different roads, as soon as
they turned to their left, someone fired on the car, Colonel could hardly
control his car and stopped the car. They all bent down because the bullets
were passing through the upper part of the car seats. After few seconds, the
firing was ceased and Major Jacob and Colonel Mike carefully rose their
heads to see situation. No one was around them and the car was also
disappeared in which Kemp was travelling. It meant Kemp knew that they
were following him so he called his companions to stop them. Colonel Mike
and Smith got off the car to look for the firers. John and Major Jacob went
ahead in search of Kemp few miles away.
Colonel Mike with Smith ran in the direction from where gunners
were firing at them. They were again targeted from the roof of a building.
Both of them bent down again and crawled under the shade of the building.
Smith covered the Colonel and Colonel ran into the building to go on the
roof. When colonel ran towards the building, someone tried to shoot him
from the roof but Smith fired at him and the gunner moved away from the
wall. Smith also ran behind the Colonel as soon as gunner moved away
from the wall of the roof. When they reached there on the roof, enemies
were running away on the roofs of different buildings. They fired at Mike
few times while running ahead. Colonel Mike and Smith were also jumping
over walls and chasing the attackers. Attackers got down from the roof and
started running in a narrow street. Colonel Mike and Smith were also
behind them. Attackers snatched a bike from a man in the street and got
away. Mike and Smith did the same thing, snatching a bike from a biker,
and started to chase them. Attackers fired at them few times. Passing
through different streets, they were on a wider road but this road was under
construction and ended at a stream. They tried to fly the bike over the
stream but fell into the stream. Colonel Mike and Smith also jumped into
the stream. Now and then they were firing at Colonel Mike and Smith but
couldn’t aim at them very well. Attackers reached at the bank of the stream
and ran into the wood.
After dropping Colonel Mike and Smith, John and Major Jacob found the
car on the highway after few minutes. Then they turned right into the wood.
They were driving real fast on muddy zigzag paths through the wood. Jacob
and John saw two men were running at a large distance and then they saw
Colonel Mike and Smith were also running after them. But the attackers in
the car picked up two men, and John also picked Colonel Mike and Smith
and once again started to chase the attackers. After passing through the
wood, they reached highway once again. Now they were going into the city
and they might have come into the wood to pick their two men. On a
deserted place, Colonel Mike fired at the car, the bullet burst the back tyres.
The car was turned over and wrecked. Major Jacob and Colonel Mike got
off from their car and went closer to the attacker’s car which was almost
destroyed. They saw three men were died at the spot just Kemp was alive.
Kemp was also very injured. They took it out of the car and got in their car
and went away.
On reaching home, first of all they gave first aid to Kemp and when he was
completely in his senses, they made him sit in a chair, tied his hands and
then Colonel Mike said to Kemp, “Who are you? Why have you attacked on
us”? He didn’t speak anything but he was just looking at Colonel Mike. “We
attacked you because you had come to our house before that”, Kemp
replied. “If you won’t answer me, I will take out your eyes”, Colonel said
again. Smith took a device which was his own invention and attached it
with Kemp’s head. As soon as Smith turned it on, Kemp screamed loudly,
his eyes were like coming out of his body and his face turned red. Mr. Smith
turned it off and Colonel Mike asked again but Kemp was out of his senses.
Major Jacob gave him a glass of water and when he became normal, he
didn’t speak but just moved his lips like he wanted pen and paper. Jacob
looked at Colonel as he was asking what to do. Colonel told John to give
Kemp a pen and a piece of paper. Kemp took the pen in his hand, his hands
were trembling and he wrote “There was a device fitted in my head. It sent
my conversation and my location to my boss so I couldn’t leave them. If I
would speak anything against their mission, they would kill me with this
device fitted in me. You might ask what you wanted but I would just write it
down”.
“I am working for a team of hackers and criminals. In fact their missions is
to rule over the world. They want to jam all networks, and want to have a
complete control over their military and political systems. There are many
politicians who are also involved in this mission but they are criminals in
reality but in front of the world they are politicians”, Kemp wrote down.
“Can you tell them who are they? Their names and other details”? Colonel
Mike said to him again.
“Every details about them are kept confidential, no one knows who are
they? We just know our bosses and as I told you our bosses are mostly
criminals and hackers”, he wrote again.
“So real convicts are politicians, right?” Colonel said again.
“Yes, real culprits are politicians who want to rule over the world. They are
offering money to people who are experts in their profession. If someone is
not willing to work for them, they blackmail them in different ways and
compel them to work for them”, Kemp said to him again.
While they were talking, Smith was trying to hack the device fitted in his
head. First of all he wanted to change the location so criminals might not
know their exact location. They system was skillfully designed and
developed which was not easy to hack but Smith was also expert in his field.
After an effort of twenty minutes, he was able to change the location of
device. Now criminal couldn’t trace their exact location.
“Give me their addresses where you report”, Colonel Mike said to Kemp.
“We just know one address and it’s the same where you were trapped in a
room. I don’t know any other location. Our boss communicate with us
through the device and see there is a micro-earphone in my ear. He can call
me at any time to give me the directions and tasks to do. They are very
organized they don’t left any evidences behind them”, Kemp said to him.
“Why do you join them when you know they are very dangerous criminals”,
Major Jacob said to him.
“I didn’t want to join them but I was in need of money. My mother was very
sick and I needed money for her operation, so I joined them just for money
and for the health of my mom”, Kemp said.
“Will you work for us now because we are working for good and our mission
is to save the world and spread peace and harmony in the world”, Colonel
Mike said to Kemp.
“Yes, but they will kill me with brutality if they know I am working for you”,
Kemp said to Colonel Mike.
“We won’t meet you but you just let us know about their activities, this will
be your only job for us and our organization will pay you well”, Colonel said
to Kemp.
“Now you go and we will give you a device to fit in the house where you
were reporting to your boss”, Jacob said to him giving the device.
“Why are you trusting me that I will work for you? What if I deceive you?”
Kemp said to them.
“I am sure you are a good man and you want to work for good and lead a
satisfied life without any crime. We have the ability to recognize people and
I think I am good judge of people”, Colonel Said.
“Yes, you are right. I am really sick of this life of crimes and evils”, Kemp
said with a smile.
“Ok you can go now, hope to see you soon”, Colonel Mike said to Kemp and
they all shook their hands with Kemp. Kemp went out of the room and
Smith was checking Kemp on his tablet.
“Are you sure Colonel Mike that Kemp will be sincere with us?” John said
to Colonel Mike.
“Yes, I am sure. He will never deceive us because I think he is not a bad
man but due to circumstances he get involved in such a thing”, Colonel said
turning towards John.
“Smith you keep checking on your tablet and computer, and let me know
whenever you see some unusual thing”, Colonel Mike said to Smith who
was still examining the situation on his tablet.
“Yes, definitely Colonel I will let you know in case of anything unusual or
important”, Smith said.
“I think everyone is feeling tired so I will make coffee”, John said and went
to the kitchen.
“That’s good idea we all need coffee at the moment”, Major Jacob said to
John.
After the coffee, they were planning for their next action when Smith said to
them, “Kemp is going to the house and he’s just fixed hidden cams. After
fixing cam he goes to his house”, Smith said to them.
“I can see Bacon now in his car, he is going somewhere”, Smith said again
looking at his laptop, it was connect with Bacon’s cam. They all came near
to Smith to see Bacon on the cam. Bacon was passing by Main Boulevard in
his car and after sometime he entered his house. I think this is the best time
we should go to Bacon’s house and catch him, he could give us some very
important information. Then they left for Bacon’s house.
They were soon there and they parked the car near the house. They were
very careful and Mr. Smith was keeping an eye on the cam. Bacon was in his
room on his computer. Major Jacob opened the door with master key, they
all entered behind the major Jacob except Smith as he was in the car
observing everything on the cam and letting them know of every minute
detail. On reaching the door of Bacon’s bed room, Colonel Mike inserted
the nozzle of gas gun under the door and triggered the gas gun which filled
the room with gas. Bacon couldn’t realize what was happening and soon he
was fainted. They carefully entered the room, took Bacon with them in the
car. Smith hacked the computer and Wi-Fi system of Bacon’s home and
also the security cams in such a way that cam was showing Bacon in his
room. Actually he froze the cam and then mixed the videos of Bacon and
connected it with the cam again. So observer would just see Bacon sitting in
chair for some time and then laying in the bed.
On reaching home, they tied the hands and feet of Bacon and made him sit
in a chair. John injected him and this would make Bacon feel dizzy as soon
as he got into senses. When Bacon came into senses, he said, “Who are you?
Why everything in room is moving? Why I am feeling dizzy?”
“We will make you alright if you answer the questions correctly otherwise
you will feel worse than this onwards”, Colonel said in harsh voice.
“What do you want to know?” Bacon said with a wave of fright in his body.
“Just tell us about the group you are working for”, Major Jacob said looking
into his eyes.
“I work in a software company and we deal in software and development of
websites as well”, Bacon said.
“I know you work in software house but I am asking about the other
activities you do like hacking etc.”, Major Jacob said repressing his smile.
“We don’t hack and I don’t know about it”, Bacon replied.
“So you want me to open your mouth with our special methods”, Major
Jacob said in offensive tone and hit his elbow on Bacon’s mouth that
started bleeding at once because two of his teeth were broken.
“I don’t know much about it but I confess they do hacking”, Bacon
answered.
“Who is your boss”, Jacob asked him holding him with the collar.
“We haven’t seen him but we just meet our managers. No one knows about
the real boss”, Bacon answered again while crying with pain.
“Tell me the address where you meet managers”, Major Jacob asked him.
He told the same address as Kemp told them. “Why do you work for them if
they are involved in illegal activities”, Colonel Mike asked him this time.
“We don’t want to work for them but they threatened me if I won’t work for
them they will kill my wife and my 6 years old daughter”, Bacon answered
with tears in his eyes.
“I think we need to watch that building and we should keep an eye on
managers”, Colonel Mike said.
“Major Jacob and John will go there and follow anyone who comes out of
the building”, colonel said again.
Next morning Major Jacob and John reached there early in the morning.
After three hours, a car came out of the building. John started the car and
chased the car which was going towards the railway station. Major Jacob
was in contact with Colonel Mike and telling him everything. The car
stopped outside the railway station and a tall man with glasses on his eyes
came out of the car and went into the railway station. John also parked the
car and Major Jacob went into the railway station while John remained in
the car. The man bought the ticket and went to platform no. 1. He sat there
on a bench, waiting for the train, he was checking his watch again and
again.
Major Jacob also sat behind him in a bench. He took few photographs of
the man and sent it to all companions. After fifteen minutes, the train
arrived and the man got into the train. Major Jacob also followed him and
got into the train. He called John to come to the next station because he
was not sure where the man would get off the train. Major Jacob sat on a
seat behind the man so he might not see him. The train stopped at the next
station and the man got off the train. Major Jacob also got off the train. The
man walked a few steps and stopped near the door of the train. He was
talking to someone on cellphone near the door. Major Jacob also stood near
the man and he was constantly talking to John and Colonel telling him the
situation. The train whistled and the man swiftly moved into the train and
the door was closed. Jacob wanted to enter the train but the door was
closed and the train departed. He missed the train and he quickly called
John and asked where he was. He was near the station so major Jacob came
out of the station.
John was outside, waiting for him in the car. Major Jacob swiftly got in the
car and they went to the highway. They had thirty minutes to reach the next
station. Smith gave them the details about next railway station. When they
reached the station, the train had already arrived there. Both of them went
into the station in search of the man. They inquired about the platform and
went there from two different entrances to find the man. When the man
saw Major Jacob on the platform, he ran into the train which was about to
leave once again. Major Jacob ran towards the train, the door was going to
close but Major Jacob stepped into the train like a tiger. He looked here and
there in search of the man but couldn’t see him anywhere around him. He
went into the next apartment but he couldn’t find him. Then he went to
search all private apartments in the train one by one. As soon as he got in
one sleeper apartment, the man was hidden behind the door, he attacked
on Major Jacob. Major Jacob was not prepared for such a sudden attack.
He fell on the ground, the man tried to hit Major on the head but major
turned over swiftly and caught his foot and hit his foot at the ankle of the
man who fell down. Major Jacob stood but the man fired at Major Jacob,
Major Jacob dived on his right to save himself and kicked the man’s hand,
the pistol was fallen from the man’s hand. They were breathing hard. The
man took out his knife and tried to stab Major Jacob, Major Jacob stopped
the knife with his hand, turned over his hand, and the knife fell down. The
man kicked at the belly of Major Jacob very hard and Major Jacob fell back.
The man swiftly grasped the pistol in his hand, Major stood in front of the
man with hands up. Before the man shot Major Jacob, Major Jacob
stretched apart his legs, bent down and blew hard between his legs. The
pistol fell from his hands. Major Jacob kicked him hard and the man fell
out of the window, breaking the window pane, on the ground. It was a wood
where that man was fallen. Major Jacob stopped the train and called John
to reach the place where the man was fallen out of the train.
He got off the train and went into the wood where the man was fallen. It
was dark so nobody could realize about the incident. Major Jacob looked
here and there in search of that man. After a couple of minutes, he found
him lying near the bushes. He checked the breath of the man, he seemed to
be dead. Major Jacob was looking at the highway where John was expected
to come. After few minutes, he saw the headlights of a car coming near to
him. This was John’s car, he came out of the car and Major Jacob told him
the whole incident.
_____________________________________________
Part 3
They took him to their place where there was latest laboratory and
specialist doctors too. Doctors gave him best treatment and his life was
saved but he was still in coma. After 12 hours he was out of danger but he
was still in coma. Smith told the Colonel Mike that he had devised a
complete software system and a device which can read the people’s mind.
In other words he could hack the brain with this software and the device.
This was purely his own invention and he did few experiments with this
device and all experiments were 100% verified.
“That is an amazing invention, we will love to see this in action”, Major
Jacob said with a smile.
“That looks like telepathy with the help of software and device”, John said.
“Yes, it’s a kind of telepathy and I start working on it after I read the details
about telepathy”, Mr. Smith said.
“So Mr. Smith you are a brain hacker”, Colonel said and everyone laughed
at his remarks.
“Yes, I am a brain hacker and this hacking is for the integrity of my
country”, Mr. Smith explained.
“I have checked my device and software, everything is working fine. I will
consult doctors when this man will be ready for electric telepathy”, Smith
said. Smith stood up and went to the other room to discuss with doctors.
He discussed with doctors for few minutes and then got back.
Doctors were willing for this test but they would keep the man under
observation while he would be under experiment. In case of any problem,
doctors would ask Mr. Smith to end the test if there was any threat to the
life of that man.
Smith fixed the device with that man and started the device and attached it
with his computer. This device was like a small brief case with some dials,
knobs, buttons, panels and colorful lights on it. He pressed few button and
moved knobs. He was constantly looking at the panel. Then he came to
computer and opened a software, entered some data and submitted the
data. They could see the processing, it was taking some time. Then on one
side of the software they saw the details about the man was appearing one
by one. First of all his photograph appeared there, then his name, age,
education, qualification and profession. Everyone was looking at the
computer with astonishment. His name was Johnson. He was 36 years old.
His height was 6 feet 2 inches. He was master in computer science and was
an ex-secret service agent. He was terminated from secret service due to
some doubtful activities. Now he was working for an underworld group
“The Rulers”. This group wanted to rule over the world and Smith and his
comrades already knew this but they didn’t know about the group yet. This
group consisted of politicians and professionals of the whole world who
wanted to control the whole world. Johnson had joined this group two
years ago when he was terminated from secret service. His title was “wolf”
in the group because he was fierce like a wolf. He was married and his wife
and kids lived in this city.
His wife was a medical doctor and kids were studying in a school.
He was expert in martial art and he got martial art training from China. His
wife was also terminated due to some illegal activities in the military
hospital. She was found helping and treating some most wanted persons by
the police and intelligence. She was an expert surgeon and now she was
running her own private hospital. Her hospital in fact connected to the
regional office of The Rulers. There was wood behind the hospital but the
regional office was located underground behind the hospital and no one
could ever find this office.
“We have to go there in the hospital and find the way to the regional office
of The Rulers”, Colonel said to Major Jacob.
“Yes, there we can find all their connection and the addresses of offices in
the world”, Major Jacob said.
“We need to finish this mission as soon as possible because delay may harm
the whole world”, John said.
“One of us will go there in the hospital as a patient and other two will be
with him as his family”, Colonel Mike said to them.
“John will go as patient, Major Jacob with me will go as the family of John
and Mr. Smith will remain outside in the car with his computer and
devices”, Colonel Mike said again.
“Everyone should be ready at 9 am, see you in the morning”, Colonel Mike
said standing from his chair and went to his room. All of them went to their
rooms.
Mr. Smith went to his computer and he wanted to get information about
the hospitals. He searched for the hospital online and got all necessary
information about it within an hour. Now he wanted to hack the hospital
systems. With an effort of 2 hours, he was able to hack the system.
Next morning they got ready at 9 am and left for the hospital in no time.
Mr. Smith was sitting on the back seat of the car. He was on his laptop,
getting more information about the hospitals. He got complete control over
the hospital systems. He hacked website and server, accessing all the
records of the hospital management system, he was also able to control
mechanical and electrical systems of the hospital. He could control lifts,
automatic doors, other and machines as well. They reached the hospital at
9:35 am and they parked the car. Mr. Smith remained in the car and rest of
three went into the hospital.
This was an extraordinary beautiful hospital equipped with latest
technology and computer systems. After passing the gate, they turned right
to enter the building. They went to the counter and told them that John is
very sick and he got high fever. Before coming there, they injected John
with a drug which caused him high fever for couple of hours. The nurse
checked the fever and she advised John to be admitted in the hospital.
Colonel Mike fitted a device under the counter, nobody could notice that a
device was fixed there. Similarly they fixed many devices in the hospital.
These devices were most of 1 square inch so nobody could notice them
easily. These were definitely connected with the computer system
organized by Mr. Smith. It contained mic, camera and hacking system
installed on a small size chip within this device. Everything was going fine
according to the plan. They filled necessary forms and fulfilled all
requirements for the hospital. They got a room for John. While passing
through corridor, they scrutinized everything. Smith had fitted devices in
their jackets which was showing everything on Smith’s laptop and devices
were detecting everything around them. They examined the room and
security cam carefully. They also searched the room and with the help of
detector, they checked every inch of the room. They didn’t want to make
any mistake.
There was very good security system in the hospital so it wasn’t easy for
them to break the security system but they could jam the system by hacking
it for some time. There was a prohibited area containing many rooms in the
back side of the hospital.
“I think now after examining the security system, we will go to the
prohibited area of the hospital”, Colonel said.
“Yes, I am sure we will find very important information from their which
may be helpful in accomplishment of our mission”, Major Jacob said
looking out of the windows.
“Look there outside the window, this block on the backyard is totally
prohibited for public to go there”, John said to them pointing towards the
block.
“Yes, at night we will go there. There are just four guards and we can cope
with them very easily”, Colonel Mike said looking at the guards from the
window.
“We will make use of injection guns to faint the guards for few hours”,
Major Jacob said.
“Yes, that’s great invention by our scientists because we can fire the gun
from a large distance and faint anyone we want”, Colonel Mike said.
“We may also need night vision goggles because there may be very dark in
some places at night”, John said.
“Yes, we have them, we will take with us at night”, said Colonel Mike. Smith
also came in the room after some time.
There were heavy clouds on the sky and soon the rain started after a while.
The rain continued till evening. The clouds were thundering and lightening.
It was a kind of storm. There was power outage for two hours due to storm.
When power was resumed, they got the blueprints of the hospital and sat
together to plan for their next action. They got ready at 11 pm. They could
see guards were doing their duty actively despite the cold weather. It was
very cold night, they could see their breath coming out of their mouths.
They took their positions behind the pillars, got injection guns in their hand
and aiming at the guards they triggered simultaneously. Two guards were
the victims. They felt little pain in their arm when small pins entered their
arms, having chemicals. They were gone faint within two minutes. Other
two guards ran towards the fainted guard but once again Colonel Mike and
Major Jacob fired at them and they were also fainted within two minutes.
They ran toward the door very carefully looking around them. They tried to
open the door but it was an automatic door which required code to open it.
They attached the device with the security system of door, and asked Smith
to break the code to open the door. Smith was with John in the room, he
decoded the code and then applied the code and the door was opened. It
was a hall with cabinets beside the walls, full of medicines. Smith had
hacked all security cams, so there was no possibility that anyone might see
them on the cam. Smith had recorded some scenes on the cam which he
was showing in the control room. So nobody in the control room could see
Colonel Mike and Major Jacob, but they were just watching what Smith was
showing them on the cam. Mr. Smith told them that there was an important
news on CNN and BBC. In Mexico, the hackers controlled the missile
system and they launched the missiles which fell on very important targets
and destroyed them. The government was really worried about this attack
because if hackers would have controlled the nuclear reactors, they had
devastated large area of the country. In fact this news made everyone
worried about their own country. They were going to hold a conference to
secure their country from the attack of hackers.
Major Jacob and Colonel Mike after searching the hall, came in the next
room. It was store-room containing some useful apparatus and equipment
for the hospital. They searched all the rooms one by one but couldn’t find
anything important. But the information they got from Johnson, revealed
that there should have been a hidden way to go from hospital to the
regional office.
“Let us go to the hall again”, Colonel Mike said.
“Why do you want to go there again”? Major Jacob asked.
“I think we are missing something that is why we are unable to find the
way”, Colonel Mike said again.
“Ok let us go to hall then to find the way to the regional office”, Major Jacob
told him.
They came to the hall again. One again they examined everything. When
Major Jacob turned over the cabinet, it was in fact a door. Major Jacob
called Colonel Mike and showed him the door. They went through the door,
it was a corridor which ended at a plain wall. Colonel Mike and Major Jacob
both tried to find something to open the wall but they couldn’t. They called
Smith and he asked them to put the device on the wall. Then they moved
the device all over the wall. Smith was detecting electrical and mechanical
system within the wall. Within couple of minutes, he found the hidden
system which he decoded once again with the computer and the wall was
opened like a door. They went on the tunnel it was about 400 meter long
which ended at a door. Once again they needed Smith to open the door, so
Major Jacob called Smith and told him the whole situation.
After an effort of five minutes, Smith was able to open the door. It was the
basement of a building. There was a door in the basement, they carefully
opened the door. It was a store-room full of computers and electronics
appliances. There were stairs going up so they went up on the stairs. The
door was closed. Major Jacob opened the door with the master key and they
were very careful. Smith was also watching everything on his computer and
letting them know what was happening with the help of device.
The Colonel Mike got toy car from his jacket, attached a device with the toy
and started the toy with the help of remote controller. The toy was running
very smoothly and Colonel Mike was watching the toy going on the screen
of his watch which was in fact a computer. It was passing through the
corridor and there was a room on the left side. The toy was exactly under
the security cam, the infra-red rays were emitted from the toy and it froze
the cam facing towards one direction. Now Colonel Mike moved the tory at
door of the room, he could see few people were sitting on the computers,
doing some work. On one side, there was a big LED, they were watching the
news on the LED.
“Our mission is successful at the first stage because we controlled the
missile in Mexico from here”, one of the person said who seemed to be an
experienced professional.
“Yes, David but our target is America and we tried from our head office to
control the nuclear reactor and missile system but we were unsuccessful”, a
young man said.
“Tonight we have to hack the nuclear reactor of Mexico”, David said to
them.
“Yes of course we will hack the nuclear reactor tonight and we are going to
zero office to hack and explode the nuclear reactor through chain reaction”,
the young man said again.
“Let us go there and complete our project as soon as possible”, David said
and they all went towards the other end of corridor.
Colonel kept the toy behind them and he was going behind them with
Major Jacob. But as soon as they turned their right from the corridor, they
saw two guards were there in the corridor. Colonel Mike put his hands into
his pocket, both of them put on mask on their faces and Colonel threw a
flexible rubber like pen in the corridor, as soon as it struck the floor, the
guards loaded their rifle and one of them went near the rubber pen and
other came towards the direction of Colonel Mike. The gas came out of the
rubber pen and diffused in a second into the nostrils of guards as they
weren’t wearing any mask. They fell down and they weren’t even moving
their eyelids. Their hands and feet became stiff like a dead men but they
were alive. It is the trait of this gas that it affects the brain for 5 hours and
then after five hours affected persons become normal.
They watched the toy again on the wrist watch screen, the toy was stopped
along the wall and nobody could be seen there on the screen. There were
few rooms so Colonel took the toy into one room. It was kitchen and then
he moved the toy into another room, it was meeting room but there was
nobody in the room. Then he moved the toy into another room, it was a big
computer lab and he could see David and his companions there. There were
some big machines fitted on the wall, few people were operating the
machine and that was connected with satellite. They were connected with
their various offices in the world through satellite to communicate with
them. There were big size LED’s on the wall, telecasting some important
locations in the world. They could see white house, airports, railway
stations, artillery centers, depot of weapons etc. these LED’s. It seemed that
missions was divided into different professionals who were doing their
work for a specific region in the globe.
David was giving instructions and it looked like he was the project
manager because everybody was following his instructions. Tonight there
mission was to hack nuclear reactor in Mexico and their professions were
constantly working on that.
“We have to hack the nuclear reactor at 1 am so everyone should be ready,
we won’t tolerate any mistake”, David said to his men.
“We are all ready, and everything is planned so there are no chances of any
mistake,” one of the man said with enthusiasm.
“Everybody rechecked his system and confirm everything is working fine
because just few minutes are left”, David told them in a loud voice.
Colonel Mike moved the toy outside the room along the wall. After a
minute, Colonel Mike and Major Jacob reached there. There was just one
guard outside the room so they threw again the rubber gas pen and the
guard couldn’t realize that pen was thrown near him because it fell under
the bench. He was fainted like other guards. Now Colonel moved the toy
into the room along the wall under a chair. He contacted Mr. Smith to hack
the system so that they might not launch their hacking mission.
“This system is very strong one and it’s very difficult to hack it, but I am
trying to hack the system”, Mr. Smith said. He was in contact with Major
and Colonel on the device. After five minutes, Mr. Smith said, “I can’t hack
the system, it seemed to be a fool-proof computer software and hardware
system but give me few more minutes, I want to endeavor again for the last
time”.
Colonel Mike and Major Jacob was waiting for Smith’s reply and they were
watching the activities taking place in the laboratory. They were trying to
understand the system and were trying to have a good idea about the
weapons there in the laboratory.
After few minutes Smith told them that he couldn’t hack the system. So
they will have to do some commando action to stop them from hacking the
nuclear reactor. They got themselves ready within two minutes because it
wasn’t easy to take control of laboratory and destroying all machines and
computers.
Colonel Mike and Major Jacob put the masks on their faces once again, and
threw rubber gas pens into the laboratory. Then they dived into the room
and rolled over the floor and stood up hurriedly and opened fire on
everyone in the room. David’s team wasn’t ready for this sudden attack so
many of them were shot by the Colonel and Major. David was a clever man,
he jumped into his small glass cabin within this laboratory and closed the
cabin. Major Jacob fired at the cabin but it was bullet proof. They fired at
glass cabin again and again but in vain. All other men were killed, just
David was left. David laughter at them and said,” I am going to hack
nuclear reactor now and it’s near America, so American will also be affected
by it. You can’t stop me anymore. See on the LED, the death of millions of
people”. He was laughing like a crazy man. Colonel contacted Smith to once
again try to hack the mechanical system and open the glass cabin door. In
the meantime, David went near a big computer system. He set the
computer to hack the system and pressed the button. System was being
hacked in a few minutes, the countdown had started. One minute was left,
then 50 seconds then 40, 30, 20, 10, 5, 4 … the glass cabin door was
opened. Colonel jumped into the cabin and shot David. Major Jacob ran
towards the computer just one second was left. He pulled the liver and the
system was shut down saving millions of people. Colonel Mike fixed time
bombs there and they ran out of the room. The room caught the fire and all
computers with devices burnt. They could hear the siren, so they ran faster
through the corridor. Near the end of corridor, suddenly three guards
appeared. Colonel Mike fired at them, two of them were died at the spot.
The third guard wanted to fire at them but Major Jacob, skidding on his
knees, went straight to third guard and kicked him on his belly. He fell
down and Major Jacob snatched his gun and hit the butt on his head. He
lost consciousness and they ran once again through corridor.
“Run fast because the building will be blasted soon”, Colonel Mike said to
Major Jacob and they started run faster than before. There was fire in the
next end of the corridor which was on their way to the hospital. So they
moved to the right tunnel. They didn’t know that where this tunnel would
end but they had no other choice. There was strong iron bars few steps
away in the tunnel, they stopped near the iron bars. Major Jacob took the
electric cutter device from his little bag and melted the iron bars within two
minutes. Once again they started running but at the end there was a heavy
iron door. It was an automatic door which was definitely operated from the
control room. Colonel Mike called Mr. Smith who examined the door on
the cam and told Colonel Mike that it could be opened by find the board
attached with this door. It would be on one side of the door. Colonel Mike
and Major Jacob examined the part of the wall on each side of the door. On
one place, he felt the wall was hollow. He fired on the sides of hollow part
and now he could see the board with few switches, resistors, circuits, chips
and wires on it. He couldn’t understand the working of board so Colonel
Mike showed the board on cam. Mr. Smith observed the board deeply and
advised Colonel Mike to attach few wires together. As soon as he attached
the wires, the door opened and once again they ran into the last part of
tunnel. They checked the time and saw just ten seconds were left for the
time bombs to explode. At the end of the tunnel, there was another door,
Major Jacob fired at the handle of the door and it was broken easily. As
soon as they came out of the tunnel through the door, the underground
building was blasted and they fell on the ground.
It was wood behind the hospital but the tunnel was about one kilometer
long. So they were about 2 kilometer away from the hospital. They ran
towards the main road because they knew that police would be there within
few minutes and they didn’t want to be arrested by the police. Smith and
John came there in the car, and they all went back to their residence. They
reported their office and told them the whole story what happened and how
they destroyed The Rulers’ office and failed their mission. They also told
that their head office is there in America where they would try to hack
American weapons and nuclear reactor. So Colonel Mike was directed to
come to America with his team to destroy the head office of The Rulers.
They collected their Visa and tickets from the administrator and their flight
was on the next day. They were feeling very tired. So they went to their bed
rooms and soon they were asleep.
Part 4
At midnight Colonel Mike awoke due to sound of TV. He came out of the
bed and went to TV lounge. He could see John, Smith and Major Jacob
sitting on sofa watching news on the TV. The news was about the hackers
who hacked missile system of US military last night. They were successful
to operate one of the missile which was launched by the hackers but due to
timely intervention of US military forces, it was destroyed in the air before
it would have fallen on the ground. During the news, Colonel Mike got call
from the head office telling him what happened there. Colonel Mike told
them that The Rulers headquarter is somewhere near Madison. This was
what they got information with the help of telepathy device software but
they didn’t know the exact location of their head office.
“Don’t worry, we will find the head office of The Rulers soon in Madison
and destroy them in no time”, Colonel Mike said on the phone and after the
call they again went to their bed rooms.
Next morning, they awoke about 9 am and after taking breakfast, they went
to market to purchase few things for their families because the flight was in
the evening. After shopping they returned to their residence and soon they
were read to leave for the airport. It took them thirty minutes to reach the
airport. On airport, there was news everywhere about destruction of
regional office of The Rulers which was destroyed by Colonel Mike and his
team. They could also watch the news about missile hacking in United
States of America. Everyone was talking about hackers and their group.
Soon they were in aero plane. Mr. Smith’s seat was with Major Jacob and
Colonel Mike was with John. All of them were discussing their mission and
planning to work more effectively in United States of America to erase The
Rulers from the Globe. They reached America in about ten hours. They
went to their houses to see their families who were waiting for them
impatiently.
John knocked at the door, her mother opened the door and was very
pleased to see John. She embraced her and dinner was ready. Both of them
dined and after dinner John told her everything happened in Europe. His
mom was very happy to find her son worked efficiently for the integrity of
his country.
“I am proud of you, my son. Always work like this for your country”, she
said to John. John felt very happy to see her mother was pleased.
John went to his computer, he wanted to check the recording of all cameras
which he fixed. He fixed cams outside the Kevin’s house, office and in
Julia’s house and in front of his main door. In one of the recording, he saw
Kevin was outside the house of Julia. He opened the main door with a key
and entered the house. Then he checked the security cam which was fixed
inside. He could see Kevin again on that recording too. Kevin was looking
for something in the apartment. He went towards the wardrobe. He turned
the wardrobe over, there was a hidden safe cabinet behind the wardrobe.
He opened the cabinet and found a laptop, few DVD’s and a device. He
closed everything and went out of the apartment.
Colonel Mike also contacted military office to get to know more about
missile hacking. They told him every detail about missile hacking and
Colonel Mike and Major Jacob were called to report their offices in the
morning to discuss about hacking.
In the morning, Colonel Mike and Major Jacob reached their offices.
Lieutenant General Sam called them in their office. They told them what
happened in Europe with full details, showing them videos and photos
which they had about their mission. They also brought the audio evidences
with them. Mr. Smith and Captain Mathew were also present there. He had
recorded almost everything in his laptop which was also displayed there.
“I think we should also call John because he was also present there with us.
He is from Fortune 500 cyber Security Company. He is very efficient and
diligent software engineer”, Colonel Mike said to Lieutenant General Sam.
“We have already called him and he is in the waiting room. I just wanted to
have few words with you and now I will ask him to come in the meeting
room”, Lieutenant General Sam said.
John came in the meeting room and he took his seat. “Colonel Mike and
Major Jacob have given me the details about the mission. Is there anything
else what you want to discuss with us”, Lieutenant General Sam asked
John.
“Yes sir, I have to tell you something very important which I found when I
reached home”, John said to Lieutenant General Sam.
John opened his bag and took laptop out. He turned it on and attached it
with the big LED fitted in the room. He showed them all the important
recordings about Kevin.
“To me, Kevin is also involved in hacking activities”, John said to
Lieutenant General Sam.
“Yes, you are right Mr. John and I appreciate your efforts which you did by
yourself”, said Lieutenant General Sam.
“We have also some reports against him being involved in hacking. Our
military office is also keeping an eye on Kevin already”, Lieutenant General
Sam said again.
“Let me show you some more recordings about Kevin”, Lieutenant General
Sam said again and called Captain Mathew to switch on the recordings.
Mr. Mathew switched on the recordings. In the video, Kevin was standing
near the helipad. A helicopter arrived there and few men came out of the
helicopter. They were Russian with bags in their hands. Kevin gave them a
bag which they opened but they couldn’t see what was in the bag. They gave
Kevin a briefcase which he opened and they could see, money was there in
the bag. They shook hand with Kevin and departed in the helicopter.
“Do you know who are they”? Lieutenant General Sam said.
“No, we just know Kevin but don’t know about the other Russian men”,
Colonel Mike said to Lieutenant General Sam.
“The man with glasses is a political leader of Russia but he is found in many
illegal activities before his political career. His name is Vladimir Putin”,
Lieutenant General Sam said.
“The other two men are the most wanted criminals by Interpol and you
know already about Kevin”, Lieutenant General Sam said again.
“I think this political leader is the chief of The Rulers because by telepathy
we read the brain of the Johnson which showed that The Rulers is run by
some political leaders”, Smith said to Lieutenant General Sam.
“Where was this video recorded”, John asked.
“This political leader was also seen in Madison many times and Kevin was
with the Russian leader was also in Madison which you have just seen in
the video”, Lieutenant General Sam told them.
“Yes, according to my information, their head quarter is somewhere in
Madison”, Colonel Mike said to Lieutenant General Sam.
“You should prepare your team and plan how to tackle them. We can’t do
anything against any foreigner without any proof. They have the
government protection so we need solid evidences to catch them”,
Lieutenant General Sam said.
“Yes I know very well. We will work secretly and efficiently to catch them,
you need not worry about it”, Colonel Mike said.
The meeting was ended after an hour. Colonel Mike, Major Jacob, John and
Smith sat together and they planned everything in detail. After coming
home, John checked the cam recordings. He saw Kevin was talking to
someone on phone. He was talking with someone and making plan to go to
Madison so John began to listen to his conversation carefully. He had to
leave for Madison at 10:00 am in the morning. John called group
conversation with Colonel Mike, Major Jacob and Smith immediately. He
told them what he heard and they decided to follow him in the morning.
Next day, after breakfast, John took his car and picked Colonel Mike, Major
Jacob and Smith. They were talking about their plan and they reached
outside the Kevin’s home at 9:40 am. Kevin came out of his house at 9:50
am and he went to someone’s house and picked him from the house. They
were going now towards the highway in Mercedes. Before they reach
highway, they stopped at a gas station. They got their car filled with gas and
did some shopping from a departmental store. They took breakfast from
the neighboring restaurant and there two more men come there. They were
discussing something, they also had a map which they had spread on the
table. The other man was briefing all of them about something. They had
coffee and shook their hands with one another and came out of the
restaurant. Now once again they were going towards highway. Other two
men also got in their car and they were also going behind Kevin’s car
towards the highway. It seemed that they had some important project to do.
John kept his car at a distance from their cars so they might not know
someone is following them. After two hours, they stopped near a trailer
along the highway. The other car also stopped there. All of them got off
from the car and one man got off from the trailer, they were talking with
one another. They checked the goods loaded in the trailer and once again
they all departed. The trailer and the other car were following Kevin’s car.
They reached Madison after three hours but in spite of going into the city,
they went to the outskirts. After some time, they reached near a stream.
There was a house near the stream. They parked the cars near the house,
trailer was also parked near the house. Few security guards came out of the
house, they unloaded the trailer and took big carton inside the house. At a
distance of few yards from the house, there was a wooden room looked like
a store, the security guards took some of the goods to that store.
John parked the car away from the road, behind the bushes near the trees.
They all got off the car and watched all activities from a large distance by
means of telescopes. Smith was once again on his computer trying to access
the computer system in the house. There was very strong Wi-Fi system and
the computer system was also attached with satellite. He was trying to
access the system but yet failed. Smith gave a gun to Colonel Mike but it
wasn’t a real gun, in fact, it was a device. Colonel Mike got a small box with
an arrow fixed on the front side. He opened the part of the gun which was
on the top of the trigger. Put the arrow headed box in that part and closed
it. The upper part of the building was made up of wood. Colonel Mike took
gun in his hand, aimed at the wooden part of the building and pressed the
trigger. The arrow headed device was fired from the gun, went straight to
the bottom of the wooden wall of the house and stuck there. Smith
controlled the arrow headed device from his laptop, it was responding fine.
When he pressed the button again the device opened and a small insect
came out of the box. It wasn’t a real insect but it was a complete computer
system and no one could ever detect that it was a hacking system. It could
transfer all the information to Smith’s laptop whenever it was in contact
with any computer.
While Mr. Smith was controlling his insect like computer, Colonel Mike and
John was advancing towards the store room. Major Jacob was there with
Smith, covering him from any possible attack. Colonel Mike and John went
behind the store but they were few yards away from the store behind the
bushes. First of all they kept sitting there for a minute and when they were
sure nobody was around them, they went closer to the store. They could see
a ventilator on the wall so John stood on Colonel Mike’s shoulder and
grasped the side bar fixed on the ventilator. He rose himself up like an
acrobat and he carefully laid over the ventilator, examining the situation
around him. He threw the rope downwards one towards Colonel Mike and
fixed it with the rod. Colonel Mike climbed up and he also reached the store
room. They threw the rope again inside the store and climbed down
skillfully like acrobats. They inspected everything in the store, it was full of
computer systems and latest lethal weapons.
On the other side, Smith moved his insect into the room. There was nobody
in the room. He moved the insect towards the door and it reached the
downstairs. There were many rooms and Kevin and some other persons
were standing right in front of the cam. Smith could see them very clearly,
they were talking about the missile program. Kevin was convincing them
that today he would be able to control missile system and destroyed the
white house.
“Everything is planned and now there are no chances of mission failure this
time”, Devin told his men. Then they moved into one room. Smith also
moved his insect computer into the room. This was, in fact, a research
laboratory and a large number of persons were working there. There were
big LED’s on the wall like they have seen in the Europe. They could see the
missile on LED’s and on one of the LED, there was a nuclear reactor.
Smith was wondering how they could see high sensitive areas easily on
their LED’s but it was reality that they did so. He was thinking it wasn’t
possible without incorporating some men from the nuclear reactor. Then he
saw Kevin was on call with someone and he was astonished to know that it
was Lieutenant General Sam. He could also see Lieutenant General Sam on
LED so there was no confusion that Lieutenant General Sam was the real
culprit. So he was the traitor who was involved in this conspiracy. Smith
sent the message to Colonel Mike and John that Lieutenant General Sam
was responsible for all hacking and destruction. Smith also told Major
Jacob about the conspiracy of Lieutenant General Sam. No one could
believe that he did so.
Smith had recorded the video call of Lieutenant General Sam with Kevin
and immediately sent this video to military head quarter and told them the
whole incident. He also told them the location so army might come there
and took hold of everything. As soon as he sent the video of Lieutenant
General Sam, he saw Lieutenant General Sam was coming there in a
military jeep.
Kevin came out of the building to greet him and they met as they were good
friends. Soon he saw a helicopter which landed in front of the building. It
was Russian leader who came there. Both Kevin and Lieutenant General
Sam greeted him and embraced him. So all the real culprits were there.
Smith called Colonel Mike and John again and told them about arrival of
Lieutenant General Sam and Russian leader. They had a big army with
them for the completion of their mission. It wasn’t easy for them to defeat
hackers with such a big army.
“We need just twenty minutes to launch missile and hit the sensitive areas
of United States of America”, Keven said to Lieutenant General Sam and
the Russian leader. “The security is very tight here and no one might enter
the building like they did in Europe”, Lieutenant General Sam said to them.
Smith took the insect closer to the server. He attached the insect with the
chip and executed the program. The insect computer retrieved all the data
from the server and sent to Smith who read the data very carefully. He had
just twenty minutes to hack all the system and save United States of
America from such a great destruction. Military couldn’t reach there in ten
minutes so they had to do themselves to save people.
On the other hand Colonel Mike and John was trying to get in the building
but they couldn’t find any way to go inside. They could see dozen of security
guards covering the building. There was just one possibility for them to
enter the building that was through gutter. The gutter lid was also behind
the store. They opened the lid and entered gutter. They guessed the
direction of the building and ran towards that direction. They were in
contact with Smith and he was telling them the directions as well as the
information of the building. Smith heard Kevin was saying that a van was
coming there soon with security guards. They were fetching some
important device for their mission. Colonel Mike and John reached under
the gutter lid which was present at the main gate. The van had to stop there
for a minute for security checking so they decided to hide themselves and
cling themselves under the van and enter the building. The van came there
with a minute. As soon as it stopped there for checking, Colonel Mike and
John clang to the lower part of the van. The van started again and entered
the building and stopped in the yard. The security officers came out of the
van and went into the research laboratory. Colonel Mike and John crawled
through the fence and they reached laundry service room. They opened the
door with master key and entered the room. There was no one in the room.
They looked for the security guard uniform and soon they found uniforms
and wore them in a minute. No one could recognize them that they weren’t
security guards. They carefully came out of the room and went through the
yard. They saw the toilets along the fence. They went into toilet to talk to
Smith. John remained outside the toilet to know the situations around.
Smith told them that just sixteen minutes are left now. And everyone had
reached the research laboratory to see the missiles falling on the sensitive
areas.
Smith was able to understand the system within few minutes. This system
actually works according to IP addresses. The missile system was designed
for the IP addresses. It detects the IP addresses of their destination and are
launched to their destination. Now Smith wanted to change the IP address
with location so they might fall on the place where he wanted.
While john was outside the toilet, a guard came close to him and asked
“Who are you”.
John replied, “I am the security guard”.
“I have never seen you before”, he said to John again.
“Yes, I am new in this company”, John replied calmly.
“Please show me ID card”, he said to John.
“Here is the card”, John said and gave him the ID card. As soon as he saw
the ID card, John briskly hit his pistol on the head of security guard and he
got fainted.
Colonel Mike came outside to see what happened there. When he saw the
security guard lying on the floor he asked John, “What happened”?
John told him the whole incident. Now once again they were going towards
research laboratory where everyone was waiting for the experiment. But
they saw Lieutenant General Sam was standing on the door and he
recognized them very well. So they stopped and went in the other direction
slowly but keeping an eye on Lieutenant General Sam.
“I can’t believe that a man on such a high responsibility can do so”, Colonel
Mike said while looking at Lieutenant General Sam.
“Yes, the greed for wealth and power to rule over the world make people
senseless”, John said to Colonel Mike.
Smith signaled them that military will reach there within 10 minutes by
helicopters and some by jeeps.
As they were looking at the signals, someone said to them, “Hands up”.
When they saw there were two security guards standing behind them. They
might have heard the conversation of Colonel Mike and John. They did so
and they tied the hands of Colonel Mike and John with the rope and they
took them to the research laboratory room to present them before
Lieutenant General Sam, political leader and Kevin. Lieutenant General
Sam and Kevin was sitting on the computers when they were brought in the
room. When Lieutenant General Sam saw them, he was surprised to see
them there. Lieutenant General Sam said,”How did you come here”?
Colonel Mike said with a smile, “We followed Kevin and you can say he
brought us here”.
“Your death has brought you here poor Colonel”, Kevin said with anger.
“God knows better who will die today and who will live”, Colonel Mike said.
“Today you will see with your eyes, how we will destroy your security
system”, Kevin said proudly.
“Don’t worry time will tell you who succeeds today”, Colonel Mike said
again.
“See how your missile system and nuclear reactor is under our control. You
can see on LED’s”, Lieutenant General Sam said again to Colonel Mike.
“This is just your mistake that you think you can control our missile system.
In fact, we will control your system”, Colonel Mike said to Lieutenant
General Sam.
“We will see, Colonel”, Kevin said again.
“After the missile experiment, we will kill you and your companion, my
dear Colonel”, Lieutenant General Sam said laughing loudly.
“This is just your idea that you will kill us but the reality is vice versa”,
Colonel replied with enthusiasm even in such a critical condition.
Kevin came near to Colonel Mike and slapped him hard and said,” You
stupid patriot, your country will never benefit you but the money. Your
patriotism will not bring anything but grief for you”.
“I know more than you who will get benefits and who is at the big loss”,
Colonel replied Kevin again.
While talking with them, Colonel Mike and John were constantly busy in
cutting ropes with the blades installed in their nails. No one could ever
notice that they were cutting their ropes gradually. In the presence of such a
big security, they were sure that Colonel Mike and John couldn’t do
anything. Colonel Mike and John were trying to keep everyone busy with
their conversation so that nobody might know what they were doing.
Now Colonel Mike said to Lieutenant General Sam, “General, why did you
do so?”
Lieutenant General Sam said, “I am not fool like you and I want to rule over
the world”.
“You can never rule over the world because you weren’t sincere. So your
men will never be sincere with you. You know as you sow, so shall you
reap”.
“Shut up, you stupid man”, Lieutenant General Sam said to Colonel Mike
angrily.
Their ropes were almost cut off and they could just free their hands with a
jerk. Colonel Mike and John were calm now as their hands were freed.
Smith was successful in retrieving the IP address as well as other
information about The Rulers’ headquarters. He has made up his mind to
hack them before the military forces arrived because there was no other
option available for him. He was inspecting everything in the building with
the help of insect computer system. He heard the complete conversation
among Colonel Mike, Kevin and Lieutenant General Sam. Colonel Mike and
John were in the guise of security guards so he wanted them free before the
military forces arrived so that they might not harm them, considering them
the enemies. Major Jacob was also worried about them. He wanted to get
into the building but Smith stopped him because there was no use to go
there. He could have been trapped like Colonel Mike and John.
Just two minutes were left, so Colonel Mike looked at John and he was also
ready to attack.
“How many minutes you needed to launch missile by your hacking system”,
Lieutenant General Sam asked Kevin.
“It will take just two minutes and now I am going to launch the missile,
Sir”, Kevin said to Lieutenant General Sam.
Then he began to press different button and initiated the process of
launching missile. He was defining the destination for the missiles by the
IP address and entering few other necessary things. When Colonel Mike
saw him initiating the process, he kicked the guard standing beside him,
snatched his gun and fired at the other guards. John was also ready to
attack, he briskly kicked Lieutenant General Sam and he fell down. Two
other guards fired at Colonel Mike but he pulled one of the guard in front of
the fire and the guard was died at the spot by the firing. Colonel Mike used
him as a shield and then threw him to one of the guard and opened fired at
him. He was also died by the firing of Colonel’s gun. Colonel Mike couldn’t
see the fourth guard who was going to fire at Colonel Mike from the back
but John kicked at his hand and his gun was fallen down. Then Colonel
Mike turned over and fired at the guard so he was also died. Lieutenant
General Sam took out his pistol and wanted to shoot Colonel Mike but John
dived on Lieutenant General Sam and both of them fell down. John kicked
at the head of Lieutenant General Sam and he got fainted. Colonel Mike
wanted to stop Kevin writing IP address and other information but before
Colonel Mike could reach him, he did so and pressed the initiation button.
The process was complete and missiles were being loaded and it would take
few minutes. Colonel mike jumped over Kevin and hit him hard on his face,
his teeth fell down and he was bleeding. Then Colonel Mike hit Kevin’s head
to the desk and he was also fainted.
The process was launched before two minutes. But just three seconds were
left to change IP address and location. But Lieutenant General Sam came
into senses and he kicked at the ankle of the Colonel Mike and he was fallen
down. Just two seconds were left now to change the location, it was not
enough time for Colonel Mike to get up and change the location and IP
address. So he hit his foot at the liver which could pause the countdown and
countdown time was stopped but the missile launching couldn’t be stopped
but it could be delayed for one minute more. So Colonel Mike called Smith
and asked him to change IP address and location of missiles’ target
location. Smith had already hacked the system, he changed the IP address
and location of the missile and he set the location as headquarter of The
Rulers.
Colonel Mike and John got guns with them, since this room was sound
proof nobody could find what had happened in the room. Colonel Mike and
John got into the security guard van. They got into the van of special
security guards. They were the same guards who were in the research
laboratory room and they were killed in that room. During their checking,
Colonel Mike got the keys and their ID cards from their pockets. So they
could go easily out of this building which was going to be destroyed soon by
missiles. Nobody stopped them till they reached the gate where they
showed their ID cards and came out of the building. After going 500 meter
in the wood, they stopped the car behind bushes. They wanted to reach
Smith as soon as possible to get them out of the place. Smith was also
coming in his car towards them. Major Jacob was sitting beside him. It was
about ten minutes and they saw a missile was coming towards the head
quarter of The Rulers and it hit the building. One after the other four
missiles hit the building and surrounding areas which was completely
destroyed. All security guards and employees were killed. No one was left
alive. Soon military helicopter and jeeps reached there. Everyone was really
surprised to see such a destruction. Everyone thanked God to save the
sensitive areas of United States of American. They met few military officers
and told them the details about the operation. Soon TV reporters and
compares arrived there too. They interviewed all of them to know about the
reality. After completing the interview, they were on the highway, they were
very tired but happy at the same time because they had destroyed the
biggest threat to the world. On the way, they stopped at a restaurant to eat
some food as they were feeling very tired and hungry too. They washed
themselves and ate delicious food there. There were news about their
mission everywhere. Some of the people noted that they are the same
officers who were involved in the mission and who saved the country. The
people gathered around them and asked so many questions. Then they
came out of the restaurant, and started their journey again. They stopped at
a gas station and people were also talking about them there too. They
hardly skipped from the eyes of the people, otherwise people would have
gathered around them.
Since john was employee of the Fortune 500 Cyber Security Company, so
the company became very popular as a security company. John was very
happy because he brought a good name and reputation to his company. The
other companies developed more trust for Fortune 500 Cyber Security
Company. Government was also very happy for such a great success in the
cyber world. Government decided to give them some awards of bravery and
rewards.
John’s mother was also watching news on TV channels. And she was very
happy for his son who did a great job for his company as well for his
country. His mother was waiting desperately for him.
John and his companions reached their city after few hours. They wanted to
go to their homes and meet their families. Everyone was missing his family
because they came back from a very dangerous mission.
John dropped everyone at his home and finally came to his house. The
neighbors of Colonel Mike was gathered near his house. As soon as he got
off the car, they ran towards the car and they had garlands waiting for
Colonel Mike. Colonel Mike’s wife and son were also waiting for him in the
house. They had made his favorite meal as a feast. They enjoyed the feast.
Then he dropped Smith at his office, his family was also waiting for him
impatiently. Infarct Smith did the main job when he diverted the direction
of missiles towards the head quarter of The Rulers.
Then he dropped Major Jacob at his house. His family was also curious to
know what happened. His sons were feeling proud of their father.
John didn’t call his mom but she was waiting at the doorsteps for his
beloved son. Her eyes filled with tears when she saw him. She embraced
him and they went inside the house. The dinner was ready for him. They ate
dinner with relish.
Next day when John entered the office, the offices was echoed with
clapping. Everyone was there to welcome John for his great performance
and bravery. His boos called him to his office. John told him details about
his mother who was fired from the office for negligence. Boss was surprised
to know that he was the son of that lady whom he fired out of his office. He
apologized for his action as it was not her fault but it was a big conspiracy
which was divulged by his son. Her mother resumed her job from the next
day and Fortune 500 Cyber Security Company became the best security
company all over the world.