LATEST UPDATES

Absolute Honor - Chapter 1014

Published at 27th of March 2022 07:47:26 PM


Chapter 1014

If audio player doesn't work, press Stop then Play button again




"When it comes to the deep eye project, I have to tell you the whole star wind plan," Mister said.

"Let's talk. I'm all ears." Qin Fei looked at his watch. "Now there's a lot of time. It seems that there's no progress in image analysis. We must push back our other arrangements until we find the enemy. Now we just lose our night vision in the night when we can't see our fingers. We don't even know where our opponent is hiding or who he is."

"Well, I'll explain the whole star wind plan to you."

Mister began to gush and explained the whole context of the star wind plan for Qin Fei.

The "star wind plan" is a huge monitoring plan, covering not only the USA, but also all the places in the world where they can reach. The means used include all USA's high-tech companies and even their high-tech communication products.

As for the first exposure of this plan, many people thought it was aimed at the war on terrorism launched after September 11. In fact, the prototype of this plan had existed as early as the cold war, but it was expanded in the name of counter-terrorism.

For example, during the cold war, in order to confront the former Soviet Union, the Intelligence Department of USA used the construction projects participated by telecommunications equipment companies around the world to set up a strange communication device in each telephone program-controlled box, which can record the incoming and outgoing calls transferred through this device, The agents stationed in the local area can regularly dress up as maintenance workers of local telecom companies and pick up what they want from those boxes.

In addition, this kind of equipment made by USA is also useful, that is, whenever the sneaking agents in the local area have nowhere to go and no communication equipment is available after their identity is exposed, they can go directly to the program-controlled box equipped with these equipment, knock out a string of moss codes through a specific line, and then send the rescue information back to the CIA headquarters, Send someone from headquarters to rescue.

This kind of box has been working since the fall of the former Soviet Union. In recent years, even some informants who used to serve the CIA have sent some intelligence to the CIA through these ancient equipment. Of course, this is rare. After all, advanced communication equipment can be found everywhere.

These are the prototype of the whole "star wind project".

Just after "9.11", when every high-level asked what methods the intelligence department could control the KB attack, the NSA and CIA fried the whole old plan, added new elements and sent it to the president's desk.

In addition to the prism project exposed by CIA intelligence analyst Edward Snowden, the monitoring scope of the other three projects has also been radiated to modern communication tools.

These include the "main road" project focusing on telephone monitoring and the "wharf" project focusing on Internet monitoring. Both depend on the processing of "metadata" information.

The so-called "metadata" can accurately reveal the time, place, equipment and participants of communication, but the content of communication is not within the scope of monitoring.

The "main road" and "wharf" projects store and analyze hundreds of millions of "metadata" on communication and Internet respectively. (under the semantics of telephone and Internet monitoring, metadata mainly refers to the time, place, equipment and participants of call or communication, excluding the contents of telephone or email.)

In June 2013, Snowden provided a top secret USA court order to the guardian of the British Empire, which showed that NSA (Department of Homeland Security) collected telephone records of millions of American customers through Verizon, the largest telecom operator in USA, including calls from the United States and calls from home to foreign countries. Verizon is an original intelligence information provider of the "main road" project.

The "nuclear" project is different from the "main road" and "wharf" projects. The scope of "nuclear" project monitoring is not as wide as the first two, but it mainly focuses on the acquisition of content information. The "nuclear" project realizes daily monitoring by intercepting calls and the places mentioned by the callers.

The "nuclear" project is responsible for intercepting the conversation contents and keywords of telephone callers. In other words, NSA, CIA and other intelligence departments establish a sensitive thesaurus, and then when the telephone user triggers a keyword of the sensitive thesaurus in the conversation, such as "all" ā Sensitive words such as "H" or "Allah Akbar" will be automatically detected by the system immediately, and the phone will be monitored and recorded.

These recordings are recorded in countless high-capacity hard disks in the huge electronic data center every day, and then sent to the relevant intelligence departments for detailed analysis, in which they can obtain the intelligence information they want.

The "wharf" project and its monitoring means are the least known of the monitoring projects implemented by NSA. Even those intelligence experts involved know little about the whole project.

The wharf project may get far more information about the American people than the other three. Because the frequency of e-mail, online chat system and other media using the Internet monitored by the "wharf" project is far higher than that of ordinary phones or mobile phones.

The so-called "metadata" of the star wind monitoring plan can accurately reveal the time, place, equipment and participants of communication, but the content of communication is not within the monitoring range.

NSA regards these "metadata" as "digital network information". The tracking and analysis of this information can effectively know whether an ordinary American people has contact with a notorious terrorist.

Similarly, based on this information, the individual's health status, political or religious beliefs, secret business negotiations, and even whether there is an extramarital affair can be seen at a glance.

At first, the "star wind plan" seemed to be just a plan for domestic monitoring. After all, the president would sign it only if it looked like a monitoring and intelligence collection plan aimed at preventing domestic KB attacks.

But on the land of USA, the president is sometimes not omnipotent.

After the approval of the "star wind plan", the intelligence department carried some private work in it, and the "deep eye" project is one of these private goods.

The difference between the "deep eye" project and the above projects is that it not only monitors the whereabouts of objects through equipment such as telephone, but also collects image data in monitoring, and the scope is no longer limited to local areas.

Intelligence departments use their huge capacity and long enough tentacles to manipulate the monitoring probe through the technical means of implanting back doors in major airports, ports and other entry-exit areas in the world.

The image data obtained by these monitoring probes will be directly sent back to the local "deep eye" project responsible department of USA from the secret network channel.

This project is a huge project.

However, only a superpower like USA can do and complete it in the world.

Because USA's windows, CPU and network root server are used all over the world, many key chips and electronic components are produced in USA.

This kind of back door monitoring method produces amazing data every day, just like putting a sea in front of you, you can't get a needle out of it.

However, the "deep eye" project has its own unique technology to solve this key problem and make it possible.

The whole project is also named according to this technology.

This is a technology called "deep eye" jointly developed by the intelligence department and its senior hackers.

The horror of this technology is that the messy intelligence departments such as CIA, NSA, DIA and CSS all hit the facial recognition data they have obtained over the years, as well as some hostile personnel and KB molecules photographed overseas. In short, the image information of all personnel who want to monitor all hit the database of the "deep eye" project, As long as these objects appear in any airport, wharf, station and other traffic points where the "deep eye" project technology is put into use, the system will immediately capture them and issue warnings.

"It sounds like a face recognition system. It's nothing special," Qin Fei said. "It's just that the database is a little larger, but there's no comparative face data. It's helpless, isn't it?"

"Hey, you seem to underestimate the ability of our intelligence department and the ability of 'deep eye'." Mister said: "deep eye is called deep eye because it can not only recognize faces, but also see through you..."

"See through?" Qin Fei was stunned.




Please report us if you find any errors so we can fix it asap!


COMMENTS