typeface
large
in
Small
Turn off the lights
Previous bookshelf directory Bookmark Next

Chapter 228 Core Database

In the CIA control room, Joey and Smith stood together. On the surveillance screen, they saw the scene that had just happened. Joey's face was excited, while Smith was frowning.

"Why is there only this Chinese soldier?" Smith touched his chin and expressed his doubts.

After the CIA's top sniper was killed, Smith told Joey to be prepared. The two men in Cuba were very likely to invade the CIA. At that time, Joey didn't believe it. According to his guess, this person was going to

If you assassinate yourself, you will definitely not enter the CIA directly. After all, the place is heavily guarded.

This time the Japanese intelligence inspection team entered the CIA, it was not their deliberate arrangement, but an established project of the National Security Council. Smith felt that if the two men wanted to invade the CIA, disguised as a Japanese inspection team, it would be the best way.

So they have done thorough protective work.

But they never expected that the entire Japanese investigation team would be instigated by China and start a fierce battle within the CIA, leading to the destruction of the entire Japanese intelligence investigation team within the CIA.

What Smith is worried about now is not how to explain the destruction of the Japanese inspection team to the Japanese. On the contrary, he does not need to worry about it at all. He only needs to send a copy of the surveillance video to the Japanese Foreign Intelligence Agency.

They don't even need to explain anything to the Japanese, because there is no need. The Japanese can only eat Coptis chinensis dumbly and know their own suffering. They don't even dare to express any dissatisfaction to them, because the Japanese should be worried that they will be bitten by the CIA.

"Maybe he was mixed up in the inspection group and maybe he was shot dead." Joey guessed.

"That's best." Smith nodded, but the worry on his face did not disappear at all. "If it weren't for this, then this person would be simply terrible."

"There can't be such a powerful person in the world, unless he is not human." Joey joked with a smile.

At this moment, the employee next to him suddenly came over and said: "Sir, Miss Natasha from the Reconnaissance Bureau came in with someone and is now rushing to the core database."

"What?" Joey's face changed drastically. "No one can enter the core database without the order of the director and the president. How could you let her in?"

"She has the document signed by the president and has the permission of the director. Everything that happens here is left to her to handle." The employee shrugged and said helplessly.

"Joy, you are responsible for the aftermath." Smith's face turned cold. "Determine whether the other person is among the corpses. Once confirmed, report it to me immediately and I will go to the database."

"Yes." Joey nodded and watched Smith leave. Thinking of Natasha, his face darkened again and he thought to himself, "What is this woman doing here, with the president's secret order?"

Joey, who was puzzled, quickly ordered the internal security troops to identify the corpses, but soon he got the news: "Except for the Chinese, there were only thirteen corpses in total."

"What?" Joey's face changed drastically. "There are fifteen people in the entire Japanese inspection team. Fourteen died. How could there be only thirteen corpses?"

"Sir, in fact, we only killed thirteen Japanese agents, arrested one Chinese, and one person is still missing." The captain of the internal guard reported.

"Damn!" Joey suddenly understood why Natasha came to the CIA, and the president's order. They missed a person, and this person was probably breaking into the CIA's core database. "Someone has invaded our security system.

"

Americans rely far more on technology than any other country in the world, and the intelligence industry is no exception. The CIA's core database is also the most secretive place in the world.

The CIA's database is divided into two layers, inside and outside. The lowest level of the underground facility is equipped with various high-tech protective facilities, as well as artificial protection. When Snow Leopard instigated the Japanese to have "intimate communication" with CIA agents,

Canglong has entered the first level.

This is the world's largest mobile database. Intelligence sent by CIA agents from all over the world will be automatically saved through this database.

The hackers also invaded this database, and the main source of information was not from CIA agents, but from some commercial companies in the United States, such as Google.

As the world's largest search engine, Google has billions of searches every day, and the CIA's database is connected to Google. Of course, Google has no right to contribute their database to the CIA, and they will not get anything.

interests, but cannot access the CIA database.

Therefore, anyone in the world who uses Google's search engine and searches for some sensitive words will almost always be targeted by the CIA, which will conduct analysis and ultimately determine the purpose of the person using the search engine and whether it constitutes an infringement of the national interests of the United States.

A big or small thing happened in China many years ago. Google withdrew from China and the Chinese government imposed sanctions on Google.

Ordinary people only know that Google's withdrawal from China is a unilateral act by the Chinese government to protect local companies. But in fact, Google was forcibly expelled from the Chinese market because it violated China's national security.

In fact, the core database of any American company is related to the CIA, but it is not as obvious as Google.

The United States is an independent country and the protection of citizens' privacy rights is extremely strict. However, ordinary people would never imagine that even if they use search engines, they are still under surveillance by the CIA and major US intelligence agencies. In the eyes of ordinary people,

In the eyes of an intelligence agency like the CIA, privacy is no longer privacy.

The most powerful country in the world has a bill that naturally infringes on people's privacy, called the Patriot Act. The content of the bill is very simple: "For the purpose of counter-terrorism, the police have the right to view any citizen's email communications, and even

Monitoring citizens’ daily communications without permission.”

Therefore, the privacy and privacy that American citizens pride themselves on, in fact, in the eyes of their rights organizations, is not privacy at all, it is almost like a public toilet that they can enter whenever they want.

Of course, this situation is no exception for any country in the world, but some countries do it not very obviously, while some countries do it very obviously. Americans are even more obsessed with peeping into the privacy of their own citizens.

For a long time, almost no country can surpass it.

This first database is a mobile database, so it is not difficult for the world's top hackers to get in. The difficulty lies in getting useful information from this massive database.

The CIA has had many successful hacker intrusions, but what the hackers were able to intrude into was actually the external mobile database.

The real secrets of Americans are hidden in the second-level database, which contains all kinds of secrets from all countries in the world from ancient times to the present. Some of them are even incomprehensible to Americans themselves, so they are stored in it.

Entering the first-level database, people will be surprised to find that almost all the answers to many unsolved mysteries in the world are in it, while the things hidden in the second-level database are some secrets that ordinary people dare not even think about.

So much so that taking a look at it in your hand will subvert an ordinary person's values ​​​​to the world.

Canglong has no nostalgia, because if the first-level database is to be downloaded, it is estimated that ten years will not be enough. The most important thing is that these intelligence data, which are regarded as treasures in the eyes of countries around the world, are garbage in Canglong's eyes, because most of them

He knows all the content. Even if he doesn't know it, it won't be of much use value to him.

The second-level database protection password is actually very simple. It's not like a Hollywood blockbuster that requires various high-tech verifications to get in. Once you break into the first level, there is basically no high-tech.

To enter the second level, you only need a simple password. Of course, this simple password is not simple, because only every president of the United States knows this password. Even the director of the CIA cannot easily open the second level database.

Because he doesn't have the authority.

When many U.S. presidents were in office, they failed without even having time to open this database to observe it. Some presidents even did not have the authority to open this database.

The person who created this database was none other than an American politician, Benjamin Franklin.

If you don’t know who Benjamin Franklin is, it’s very simple. Get a hundred dollar bill. The fat baby face on it is the famous Benjamin Franklin.

A figure who is not the president of the United States, but is parallel to the founding president of the United States, Benjamin; Franklin, Washington's intelligence officer during the American Revolutionary War, is equivalent to the current director of the CIA.

At that time, the United States was not independent yet, let alone the so-called CIA, but Benjamin Franklin was one of the drafters and signers of the American Declaration of Independence.

How can this fat man have such prestige? His important role in American history is not only assisting Washington in establishing the United States, but also because he established a unique intelligence system.

After the fat man Benjamin Franklin, the American intelligence system became more and more complete. This second-level database was also established by him. Until later, after many twists and turns, the Americans obtained more and more secrets, many of which were stolen.

stored in this database.

After the CIA was established and its headquarters moved to Langley, Virginia, the secret database of the United States History Collection was moved here and connected to the CIA's original database.

The reason why the password of this database is very simple is because everyone has the opportunity to decipher his password, because the password board of this database is placed in the courtyard of the CIA headquarters...

This chapter has been completed!
Previous Bookshelf directory Bookmark Next