Realizing, that it wasn`t such a great beginning, Bypass takes his drink to more comfortable seating allowing him to fall to VR.
Initializes Encryption protocols for comunication channel within the team, runs analyze to be sure that his AccessID is not tracked or otherwise watched. Then he makes imself comfortable, leaving just a window to see what is going on in real world, leaving the meat speed far behind, he begins to search for useful and actual informations:
Initializing Datasearches
1) ABG: resources, fields of interests, public research results, possible links to shadowy resources, media profile
2) Current meeting: Security, purpose of the meeting, other guests and their topics (using Mr J`s list), interresting and VIP audience, Horizon involvement
3) Dr. Bouckaert: current research, publications, critics (on field of science and ethics), media profile
4) Exterminators activities, members and records, Last events and statements...
If we have more time, I would forge some acess documents, in the current state it would be more difficult. Possibility is even to hack guest list, or fake some employee`s ID. This way or another, I would need access to their nodes so Ill better begin immediately after this meeting. But what is evečn more important, I have done some datasearches regarding ABG and our Dr. Julie Bouckaert. And, of course, Exterminators and LS fluff to this operation. I hope by the time of your arrival to the club I would have some results ready. Some points...if we are supposed to find a way to protect her, we also find a way to harm her and the rest of the meeting also. So we aree better watsch ourselves very cautiously not to being followed. Einheimischen, any of you know that Horizon place?