Feb 6, 2020 9:19 pm
Zoey hooks the comm device into her rig and a few minutes later manages to break through the layers of encryption. Perhaps unsurprisingly there is nothing on the device other than a log of outbound and incoming calls to one number, the one that just called through.
Checking through the running programmes and subroutines Zoey doesn't note anything that indicates the devices is transmitting it's location but that doesn't mean there isn't a separate tracking device in the casing. It wouldn't take too much though to clone the device onto a PAD so any messages get routed to you if you didn't want to risk carrying the device
Checking through the running programmes and subroutines Zoey doesn't note anything that indicates the devices is transmitting it's location but that doesn't mean there isn't a separate tracking device in the casing. It wouldn't take too much though to clone the device onto a PAD so any messages get routed to you if you didn't want to risk carrying the device