What is it?
Didn't I tell you...
I just spoke with Asimov on the comms to confirm the missions assigned to the members of the Purifying Force.
Bianca... is in City 15 right now conducting her mission.
...
The kind of fighting method that ignores damage to the M.I.N.D. is nothing like... what Bianca would do.
...
Disable Construct M.I.N.D. camouflage module.
Based on the information revealed in our conversation, continued use of simulated camouflage is no longer necessary.
Bianca's body dissolves into the air, turning into a tiny data stream of flashing neon light.
Subterfuge failed. Switching procedure...
Hey! Wait!
There is no reason to stay here. Huaxu does not permit purposeless actions.
...
The "Bianca" who claims to take orders from Huaxu vanishes into thin air in front of the Gray Ravens.
...
Understood.
...The program signal has disappeared. But...
There are no traces left behind in the virtual space. It didn't leave by moving.
Then how did the program escape? Advanced camouflage? A cross-program pathway as a springboard? Directly hijacking remote data? Altering the lower port levels of Gestalt?
It couldn't have been changing the port levels. The risk of being detected by Gestalt's anti-interference protocols is too high...
First and foremost, cross-reference with a data slice from five minutes ago.
On it.
In the meantime...
Commandant, what method do you think she used?
We have to rely on your reasoning to figure this out. Having been dissociated with living as a human for so long, our way of thinking is closer to that of a machine.
It's harder to figure out our blind spots when we all think alike.
(No... Liv's scanning capability would've detected any signs of camouflage...)
It's unlikely to maintain an advanced data camouflage in front of Liv. If there were any sign of hijacking a program, there would've been traces left behind...
It's possible.
Forcibly hijacking a program requires a burst of considerable data strength, but I didn't detect any change in level output... And data camouflage doesn't seem too possible with Liv around...
In that case, maybe we should consider the possibility that the program utilized data replacement as a springboard?
There is no way to detect it directly, but utilizing data replacement at such a high speed is bound to make the target program behave abnormally.
If you find the abnormal program... You would be able to track the movement of "Bianca"... Is that so?
Yes... My thoughts exactly.
Liv will be in charge of scanning, and I'll be in charge of data analysis.
Understood!
The sub-terminal was detected by the Babylonia task force.
...
However, it has not been located by them. It is proceeding to its new position according to the previous bridge route.
...Have you achieved your objective?
Data masking has been initiated. The goal of delaying the task force in their search is partially complete.
...You haven't eliminated them?
Computing power has been prioritized to maintain infiltration efforts. It was impossible to allocate enough power to the sub-terminal for combat purposes.
Will Babylonia fall as we planned?
Everything is under control.
...