typeface
large
in
Small
Turn off the lights
Previous bookshelf directory Bookmark Next

Chapter 1016 Huge Star Wind Project

"Speaking of the Deep Eye Project, I have to tell you about the entire Star Wind Project." Mist said.

"Then let's talk, I'm all ears." Qin Fei looked at his watch: "We have a lot of time now. It seems that there is no progress in image analysis. Our other arrangements must be pushed back until we find the enemy. Now we

Even if we lose our night vision goggles in a dark night, we don’t even know where the opponent is hiding or who he is.”

"Okay, then let me explain the entire Starwind plan to you."

Mist began to explain to Qin Fei the ins and outs of the entire Star Wind Project.

"Project Starwind" is a huge surveillance plan that covers not only the United States but also all places in the world that they can reach. The methods used include all high-tech companies in the United States and even their high-tech communication products.

such as.

Regarding the earliest exposure of this plan, many people thought it was for the anti-terrorism war launched after "9.11". In fact, the prototype of this plan already existed during the Cold War, but it was only expanded in the name of anti-terrorism.

For example, during the Cold War, in order to confront the former Soviet Union, the U.S. intelligence agency used construction projects that telecommunications equipment companies participated in around the world to install a strange communication device in every telephone program-controlled box.

This device can record the incoming and outgoing calls transferred through this device, and agents stationed in the local area can regularly dress up as maintenance workers from the local telecommunications company and go to those boxes to pick up what they want.

In addition, this kind of equipment manufactured by the United States has another use. Whenever the local agents have nowhere to go and no communication equipment is available after their identities are exposed, they can go directly to the program-controlled computers equipped with these equipments.

In the box, by connecting to a specific line and tapping out a string of Morse code, the distress message can be sent back to the CIA headquarters, so that the headquarters can send people to come for rescue.

This kind of box has been still working after the fall of the former Soviet Union. In recent years, some informants who once served the CIA have even sent some intelligence to the CIA through these ancient devices. Of course, this is very rare. After all, now advanced

Communication equipment abounds.

These are the prototypes of the entire "Starwind Project".

It's just that after "9.11", when high-level officials asked the intelligence agencies about how they could control KB attacks, the NSA and CIA people refrigerated the entire old plan and added new elements.

On the president's desk.

In addition to the "Prism" project exposed by CIA intelligence analyst Edward Snowden, the monitoring scope of the other three major projects in the "Starwind Project" has also radiated to modern communication tools.

These include the "Main Road" project, which focuses on phone monitoring, and the "Terminal" project, which focuses on Internet surveillance. Both rely on the processing of "metadata" information.

The so-called "metadata" can accurately reveal the time, location, equipment used and participants of the communication, but the content of the communication is not within the scope of monitoring.

The "Trunk" and "Dock" projects store and analyze trillions of "metadata" on communications and the Internet respectively. (In the semantics of phone and Internet surveillance, metadata mainly refers to the time of a call or communication.

, location, equipment used, participants, etc., excluding phone calls or emails, etc.)

In June 2001, a top-secret USA court order provided by Snowden to the British Empire's "Guardian" showed that the NSA (Homeland Security Agency) collected millions of dollars in data through Verizon, the largest telecommunications operator in the United States.

Telephone records of U.S. customers, including calls within the U.S. and calls from within the country to foreign countries. Verizon is an original intelligence provider for the "Main Road" project.

The "Nuclear" project is different from the "Main Road" and "Dock" projects. The scope of monitoring of the "Nuclear" project is not as extensive as the first two, but it mainly focuses on the acquisition of content information. The "Nuclear" project intercepts

Calls and the location mentioned by the caller can be used for daily monitoring.

The "Nuclear" project is responsible for intercepting the conversation content and keywords of telephone callers. In other words, the NSA, CIA and other intelligence agencies establish a sensitive vocabulary library, and then when the phone user triggers a certain keyword in the sensitive vocabulary library during the conversation, such as

Sensitive words such as "Allāh" or "h Akbar" will be automatically detected by the system immediately and the phone call will be monitored and recorded.

These recordings are recorded on countless large-capacity hard drives in huge electronic data centers every day, and then sent to relevant intelligence departments for detailed analysis, and from which they can obtain the intelligence information they want.

The "Dock" program and its surveillance methods are one of the least known of the NSA's surveillance programs, and even those intelligence experts involved in it know little about the program as a whole.

The information about the American people obtained by the "Dock" project may far exceed that of the other three. This is because the emails, online chat systems and other communication media that rely on the Internet monitored by the "Dock" project are used much more frequently than ordinary people nowadays.

phone or mobile phone.

The so-called "metadata" of the Starwind surveillance program can accurately reveal the time, location, equipment used and participants of the communication, but the content of the communication is not within the scope of monitoring.

The NSA considers this "metadata" to be "digital network information." Tracking and analyzing this information can truly tell whether an ordinary American has contact with a notorious terrorist.

Based on this information, an individual's health status, political or religious beliefs, confidential business negotiations, and even the existence of extramarital affairs can be clearly understood at a glance.

At first, "Project Starwind" seemed to be just a plan for domestic surveillance. After all, it seemed to the president that it was just a surveillance and intelligence collection plan designed to defend against domestic KB attacks.

But in the land of the United States, the president is sometimes not omnipotent.

After the "Star Wind Project" was approved, the intelligence agency included some private work in it, and the "Deep Eyes" project was one of these private goods.

The difference between the "Deep Eyes" project and the above projects is that it not only monitors the whereabouts of objects through equipment such as telephones, but also collects image data under surveillance, and the scope is no longer limited to the local area.

The intelligence agencies use their huge capabilities and long enough tentacles to manipulate surveillance probes through technical means of implanting backdoors in equipment at major airports, ports and other entry-exit areas around the world.

The image data obtained by these surveillance probes will be sent directly back to the department responsible for the "Deep Eye" project in the United States through a secret network channel.

This project is a huge one.

However, only a superpower like the United States in the world can do it and complete it.

Because the whole world is using USA windows, CPUs and network root servers, many key chips and electronic components are produced in the USA.

This kind of surveillance method that uses backdoors to conduct flying-goose-plucking operations generates data every day that is simply astonishing. It is like putting a sea in front of you, and you cannot fish out a needle from it.

However, the "Deep Eyes" project has its own unique technology that solves this critical problem and makes it possible.

The entire project is also named after this technology.

This is a technology called "Deep Eyes" jointly developed by the intelligence agency and its senior hackers.

The terrifying thing about this technology is that various intelligence agencies such as CIA, NSA, DIA, CSS, etc. all use the facial recognition data they have obtained over the years as well as all the hostile personnel and KB elements photographed overseas.

The image information of all the persons who want to be monitored are all hit in the database of the "Deep Eye" project. As long as these objects appear in any airport or terminal, station or other transportation point where the "Deep Eye" project technology has been deployed, the system will

It will be captured immediately and a warning will be issued.

"It sounds like this is just a face recognition system, nothing special." Qin Fei said, "It's just that the database is a bit larger, but without facial data for comparison, it's helpless, right?"

"Hey, you seem to be underestimating the capabilities of our intelligence department and the capabilities of Deep Eyes." Mist said: "The reason why Deep Eyes is called Deep Eyes is because it can not only perform facial recognition, but it can also perform face recognition.

I can also see through you..."

"See through?" Qin Fei was stunned. (To be continued)


This chapter has been completed!
Previous Bookshelf directory Bookmark Next