With eyes that almost went numb and lifeless, Evan logged into the laptop.
His mind went blank as he concentrated, searching through the files.
Steve might have already used people to get this, but Evan had taken many security measures. If the strings of identification were incorrect, the entire program would self-destruct.
He transferred the data to the USB. Since his right hand was almost cripple, his speed slowed down by a great degree as he had to use his left hand.
After Evan handed over the USB, a man with a sharp jawline and piercing eyes took it and plugged it into another laptop before he tapped on the keyboard with a sense of urgency, his fingers moving swiftly over the keys.
The man opened the Breach Protector and started experimenting with it as if to make sure everything was alright.