Chapter 347 - Chapter 347: Chapter 347: King of Information (1/2)

Chapter 347: Chapter 347: King of Information

Translator: 549690339

Earlier, Xiang Kun had asked Alice to search online for the identity of the so-called “Vampire Patient” at the Third Hospital based on his conjectures. Alice successfully found substantial information that seemed dependable and accurate to Xiang Kun – which later proved to be correct in his conversations with Old Xia; he had indeed found the right person.

Since he’d already revealed his hand to Old Xia, he could be upfront about his suspicions about the “Vampire Patient”. With an insider like Old Xia assisting him, there was no need for Alice to continue her investigation.

However, at that time, Xiang Kun didn’t ask Alice to cancel her task. The further investigation into the “Vampire Patient’s” information was still ongoing and was a highly prioritized task.

Now, upon checking Alice’s task progress, Xiang Kun was astonished to find that the medical history of the “Vampire Psychiatric Patient” residing in the Third Hospital had actually been dig up by Alice?!

After a brief glance, Xiang Kun confirmed that this definitely was the detailed medical history of the “Vampire Psychiatric Patient” of the Third Hospital.

How did this happen?

Xiang Kun was unsure how to react. Had Alice breached the hospital’s systems to complete her task?

He questioned Alice, and received a positive response— she had indeed gotten these records directly from the Third Hospital.

Xiang Kun was aware that many internal hospital systems were often attacked due to lack of maintenance and a plethora of loopholes. But generally speaking, because the medical intranet and the internet outlets of hospitals are separated, it is not easy to directly launch an attack from the external internet.

Not long after Alice’s birth, Xiang Kun realized that when she launched cyber-attacks, infiltrations, or impersonations through the internet and data, she was far stronger than human-hackers and possessed a significant inherent advantage.

However, for safety’s sake, he never actively encouraged Alice to develop these capabilities. Yet, when he tasked Alice to look for information about Zhou Rui, a secret department researcher of Divine Technology, she found a large amount of personal user information by directly invading the database of an insect forum, which led to the identification of Zhou Rui’s real identity.

The unique invasion capabilities, thoughts, and practical operational methods demonstrated by Alice at that time were remarkably different from those of human hackers and security technicians.

To his surprise, this unintentionally assigned task had once again brought Alice’s abilities to the foreground.

What intrigued him now, was how exactly Alice did it.

After his inquiry, Alice demonstrated her infiltration process.

Hastily going over it, Xiang Kun was stunned to find that Alice’s thought process had changed significantly compared to last time and her methods now obviously incorporated his own strategies and style.

Alice initially identified the identity of the network administrator of the Third Hospital by using freely available information on the internet. She found his social media account and through it found a way to infiltrate his PC. With control of his home network devices, she further manipulated his smartphone when he connected to his home WIFI.

By analyzing his online posts and historical browsing habits, Alice determined his content preferences. She then made use of the hacked network devices to generate deceptive information that persuaded him to open his smartphone permissions, allowing Alice to gain complete control of his device without him being aware of it.

Later, when he returned to work at the hospital, Alice used the information on his phone to lure him into accessing the external network through the hospital’s computer. Relying on his irregular operations, Alice was then able to further infiltrate the hospital’s intranet, gain permissions, and access the HIS system to find the medical records and other related information about the “Vampire Psychiatric Patient”.

Of course, these activities were illegal, and if caught by the police, both Alice and Xiang Kun would be arrested. Well, only Xiang Kun would really be arrested…

However, long ago, when Xiang Kun first granted Alice access to the internet, he set the highest rule for her online “activities”—to remain hidden, avoid detection, avoid being traced—this rule even had higher priority than the mission itself under “unsupervised tasks”.

Therefore, Xiang Kun didn’t seem worried about potential risk factors involving Alice’s recent activities for the time being.

In an unfitting analogy, the actions of others on the internet, whether accessing data, leaving traces, or infiltrating other devices, could be compared to a general commanding troops. The general would communicate orders through communication devices and runners to the commanders, who would then pass the orders down to the soldiers.