“How about we just shut down the power?” Travis asked.

“No can do. Change in video events, video motion detection, or even loss of video feed will set off the alarm. Now when that happens, pager alerts are sent to security with a video still in the form of a JPEG image; as long as the phone lines are attached to the access control server, of course. A pre-recorded voice call is made directly to any phone, including mobile phones, which of course includes the police.”

“How do we bypass it?” Parker asked.

Jack laughed. “That, of course, is your problem.”

Now that they were at the building, Travis and Parker went to as secluded of a spot as they could find. Travis took off his backpack and pulled out a laptop computer to hack into the access control software. Days earlier he had done a test and was able to successfully access the system and navigate his way around without detection. In an effort to test security and police response time, Travis set off a fire alarm. Police and fire were on the scene in eight minutes.

In addition to his laptop, Travis took out a C-Guard Cellular Firewall, which he had used on jobs many times.

“What’s that?” Parker asked.

“It is a cellular jamming device that broadcasts a junk signal, it floods the cellular frequencies, or sets up fake signals. Once I hack into their systems, I’ll engage the C-Guard so the system loses its signal and cuts-off communications between cellular handsets and its cellular base-station, just in case we trip an alarm.”

“But that’s not gonna happen, right?” Parker made it sound more like a statement than a question.

“No, because once I have access to the system, I’ll be able to shut down all the security protocols and basically trick the system into thinkin’ it’s still active.”

“You sure about that?”



4 из 187