Chapter 1452 Skeleton

Style: Historical Author: rock hermitWords: 1934Update Time: 24/01/11 09:43:10
"We don't need to do this in too detail." Fan Keqin said: "We can just put forward a general framework. After all, we are at the headquarters, and Zhang Zhikai and the others understand the situation in more detail than we do. Let's put the points that need attention , just bring it all up and make a rough assessment and tell it to Zhang Zhikai. Let him fill in the details in Guangzhou, so the effect should be better."

When Fan Keqin said this, he paused and then said: "For example, what I just proposed is the time for changing the guard and the direction of infiltration. In addition, even Zhang Zhikai can't do the placement of the bomb. After all, we don't know the situation in the office inside. Clear. But I personally think it should not be difficult to hide.

For example, in your office, after no one sneaks in, I just need to place a bomb under the row of drawers in your desk. When it's time to go to work, an explosion is enough to have a strong killing effect. It's hard to guard against, so I guess the job of placing bombs in the two offices shouldn't be too difficult. "

"Don't use my office as an example." Qian Jinxun bared his teeth at Fan Keqin and said, "But you're right, after all, the generals are subject to foreign military orders. We only need to provide a rough skeleton. The specific flesh and blood filling needs to be done by Zhang Zhikai and others themselves."

With that said, Qian Jinxun picked up his notebook and started writing in secret words again, saying: "The time of the two offices is a little earlier than the mine array at the Qiangbing Warehouse, so the means of instant communication should be determined first. "

"Yes." Fan Keqin said: "Let Han Qiang's technical team be responsible for the establishment of communications. Silent weapons during infiltration. Also, I suggest placing a few gunmen on the periphery during the operation to avoid accidents..."

Next, the two brothers wrote down the skeleton they had just discussed and some precautions. Of course, the Intelligence Department was mainly responsible for this incident, so Qian Jinxun was basically keeping track of everything.

After he finished writing, Fan Keqin compared the existing information several times and made several supplementary suggestions. Even if it is completely completed.

Qian Jinxun said: "There are some things that need to be done now, such as the transportation of bombs needs to be strengthened, the establishment of communications, and the specific terrain for setting up mine arrays, etc. Come on, I don't care about you, I have to go there in person. Go to the telecommunications department and ask them to send these things to Guangzhou."

Fan Keqin said: "I'm leaving too. Don't forget about letting Jiang Bin build a bomb. In addition, about the new central bank in Guangzhou, tell Zhang Zhikai and let him decide on his own. As long as the robbery can be completed within three minutes, That's fine. If it's more than that, I'd rather go out without any money and blow up the bank. I think it might be easier. Also, don't rush to transport the stolen property back. You can hide it in a secret place temporarily, and later It’s just that it’s being transported slowly, and the investigation needs to be more detailed. Otherwise, the current intelligence will not be enough.”

"I can't forget it." Qian Jinxun said as he and Fan Keqin walked out of the office. Fan Keqin returned to the security bureau on his own, while Qian Jinxun went directly to the telecommunications room.

Similarly, for this mission, Qian Jinxun set up a special communications team to ensure efficient operation of both receiving and sending around the clock.

Therefore, after Qian Jinxun entered the specialized communication group, he and the dispatcher re-formulated the content of the message, using the least number of words as possible to send more content. Otherwise, the content of the message is too long and the sending time will be correspondingly lengthened. In fact, whether it is receiving or sending, as long as the time is too long, the risk will increase.

In fact, there has always been a misunderstanding here, that is, there is no danger in receiving telegrams. In fact, this is not the case. This requires a detailed look at the specific situation.

Yes, under normal circumstances, sending telegrams is the most dangerous, because as long as there is an enemy monitoring station within the radio wave range, the signal you send will almost certainly be captured.

Receiving telegrams is correspondingly much safer. Of course, this is also a normal situation. For example, your station has never been exposed or sent a telegram. In this case, you can always turn on your phone and be ready to receive it. Then the chance of the enemy finding you will be very low.

But if your station ever sent a telegram. Then you will face certain risks when receiving telegrams.

Because you have sent a telegram, you cannot guarantee that the enemy will specifically monitor your entry. Even positioning you. If these methods are used by you. Then the next time you receive a telegram, you turn on your phone at the same place. If the other party calls back with the same frequency and the same method, the enemy will know that you have turned on your phone at this time. It is reasonable to conclude that you may be receiving a call back.

At this time, if you were really targeted before, and resorted to tactics. Then positioning methods such as the power usage method can still narrow down the specific location information where you receive telegrams. Even if the other party's layout is sophisticated enough, and with a little luck, your address can be found very accurately the moment you turn off your phone after receiving the telegram.

Therefore, it is incorrect to believe that there is no danger in receiving telegrams. You can only say that receiving a telegram is much less dangerous than sending one. But it cannot be said that there is no danger at all. This is the most objective view.

Of course, we can’t just be unfounded. If you scare yourself all day long, it will only aggravate the danger. After all, the saying that your biggest enemy is yourself makes sense. As long as you do your best to reduce the risk and remain alert enough, you will be a very qualified telegraph operator.

The so-called electricity method is actually very simple. Give a very simple example. After you sent the telegram, we narrowed the scope to, say, three residences, and you waited for a reply at one of them.

That's when the call back you've been waiting for comes. Based on the previously captured frequency, we determine that this signal may be the reason for replying to you. At this time, I monitored the electricity consumption of these three households.

For example, the electricity consumption of each household is ten. But soon after that signal of possibility faded, one of the houses' electricity usage went to eight. Then I can infer that you just turned off the radio. So there was a very small change in power consumption. At this time, I can basically determine that among the three residents, the one with changing electricity consumption that I just monitored with the electricity consumption method has a radio station hidden.