34 35 301 The "Bianca" who claims to take orders from Huaxu vanishes into thin air in front of the Gray Ravens.
35 36 301 ...
36 37 302 Liv, do a full-band scanning. 38
37 38 201 1 1031001
38 39 301 1 Liv Understood. 1
39 40 301 Liv ...The program signal has disappeared. But... 1
40 41 302 What is it? 42
41 42 301 Liv There are no traces left behind in the virtual space. It didn't leave by moving. 1
42 43 203 1 0.25 -400
43 44 201 2 500026 400
44 45 301 1 Lee Then how did the program escape? Advanced camouflage? A cross-program pathway as a springboard? Directly hijacking remote data? Altering the lower port levels of Gestalt? 2
45 46 301 Lee It couldn't have been changing the port levels. The risk of being detected by Gestalt's anti-interference protocols is too high... 2
46 47 301 Lee First and foremost, cross-reference with a data slice from five minutes ago. 2
47 48 301 Liv On it. 1
48 49 301 Lee In the meantime... 2
49 50 301 Lee Commandant, what method do you think she used? 2
50 51 301 Lee We have to rely on your reasoning to figure this out. Having been dissociated with living as a human for so long, our way of thinking is closer to that of a machine. 2
51 52 301 Lee It's harder to figure out our blind spots when we all think alike. 2
53 54 301 (No... Liv's scanning capability would've detected any signs of camouflage...)
54 55 57 301 Lee It's unlikely to maintain an advanced data camouflage in front of Liv. If there were any sign of hijacking a program, there would've been traces left behind... 2
55 56 57 301 Lee It's possible. 2
56 57 301 Lee Forcibly hijacking a program requires a burst of considerable data strength, but I didn't detect any change in level output... And data camouflage doesn't seem too possible with Liv around... 2
57 58 301 Lee In that case, maybe we should consider the possibility that the program utilized data replacement as a springboard? 2
58 59 301 Liv There is no way to detect it directly, but utilizing data replacement at such a high speed is bound to make the target program behave abnormally. 1
59 60 203 1 0.25 -600
60 61 203 2 0.25 600
61 62 201 3 500166
62 63 301 1 Lucia If you find the abnormal program... You would be able to track the movement of "Bianca"... Is that so? 3
63 64 301 Liv Yes... My thoughts exactly. 1
64 65 301 Lee Liv will be in charge of scanning, and I'll be in charge of data analysis. 2
65 66 302 Let's do this. 67
66 67 301 AniZhuanchangBegin Lucia & Lee & Liv Understood! 1 2 3
71 72 301 AniZhuanchangEnd 1 Huaxu The sub-terminal was detected by the Babylonia task force.
72 73 301 Luna ... 1
73 74 301 Huaxu However, it has not been located by them. It is proceeding to its new position according to the previous bridge route.
74 75 301 Luna ...Have you achieved your objective? 1
75 76 301 Huaxu Data masking has been initiated. The goal of delaying the task force in their search is partially complete.
76 77 301 Luna ...You haven't eliminated them? 1
77 78 301 Huaxu Computing power has been prioritized to maintain infiltration efforts. It was impossible to allocate enough power to the sub-terminal for combat purposes.
78 79 301 Luna Will Babylonia fall as we planned? 1