Absolute Honor

Chapter 1016: Huge Starwind Project

"Speaking of the Deep Eye project, I have to tell you about the entire Starwind Project." Mister said.

"Let's talk about it, I'll listen." Qin Fei looked at his watch: "There is a lot of time now. It seems that there is no progress on the image analysis side. Our other arrangements must be pushed back. We will wait until we find the enemy. It’s the night when I can’t see my fingers. Even where the opponent is hiding, who is it? We don’t know anything."

"Well, then I will explain the whole Starwind Project to you."

Mister began to talk endlessly to explain to Qin Fei the ins and outs of the entire Starwind Project.

The "Star Wind Project" is a huge surveillance program that includes not only the USA, but also all the places in the world where they can reach. The methods used include all high-tech companies in the USA and even their high-tech communication products. such as.

Regarding the earliest exposure of this plan, many people thought it was aimed at the anti-terrorism war launched after "9.11". In fact, the prototype of this plan existed as early as the Cold War period, but it was expanded in the name of anti-terrorism.

For example, during the Cold War that year, in order to fight the former Soviet Union, the intelligence department of the USA used the construction project that the telecommunications equipment company participated in on a global scale and installed a strange communication device in every telephone program control box. This kind of equipment can record the records of phone calls transferred through this equipment, and the agents stationed in the local can make up as maintenance workers of the local telecommunications company on a regular basis, and pick up the things they want in those boxes.

In addition, this kind of equipment made by USA has another usefulness, that is, whenever a local agent who sneaks into the area has nowhere to go and no communication equipment is available after his identity is exposed, he can go directly to the program control with these equipment. In the box, knock out a string of Morse codes by connecting to a specific line, and the distress message can be sent back to the CIA headquarters, so that the headquarters can send people to rescue.

This kind of box has been working after the fall of the former Soviet Union. In recent years, there have even been some informants who used to serve the CIA to send some intelligence to the CIA through these ancient devices. Of course, this is very rare. After all, it is now advanced. Communication equipment abounds.

These are the original forms of the entire "Star Wind Project".

It was just that after "9.11", when every high-level executive asked what the intelligence department could do to control the KB attack, the people from the NSA and the CIA cooked up the whole old plan, and added new elements to it. Go to the president's desk.

In addition to the "Prism" project exposed by CIA intelligence analyst Edward Snowden in the "Starwind Project", the monitoring scope of the other three projects has also radiated to modern communication tools.

These include the "trunk road" project focusing on telephone monitoring and the "pier" project focusing on Internet surveillance. Both rely on the processing of "metadata" information.

The so-called "metadata" can accurately reveal the time, location, equipment used, and participants of the communication, but the content of the communication is not within the monitoring range.

The "Main Road" and "Dock" projects store and analyze billions of trillions of "metadata" on communications and the Internet, respectively. (Under the semantics of telephone and Internet surveillance, metadata mainly refers to the time, place, equipment used, participants, etc. of the call or communication, and does not include the content of phone calls or emails.)

In June 2013, a top-secret USA court order provided by Snowden to the Guardian of the British Empire showed that the NSA (Homeland Security Agency) collected millions through Verizon, the largest telecommunications operator in the United States. Phone records of American customers, including calls made in the United States and calls made from domestic to foreign countries. Verizon is an original intelligence information provider for the "Main Road" project.

The "nuclear" project is different from the "main road" and "pier" projects. The scope of monitoring of the "nuclear" project is not as extensive as the first two, but it mainly focuses on the acquisition of content information. The "Nuzi" project implements daily monitoring by intercepting calls and locations mentioned by the caller.

The "Nuzi" project is responsible for intercepting the content and keywords of the phone caller's conversations. In other words, intelligence agencies such as NSA, CIA and other intelligence agencies establish a sensitive vocabulary, and then when a phone user triggers a certain keyword in this sensitive vocabulary in a conversation, such as "Allāh" or ";Akbar" and other sensitive words, they will It was automatically detected by the system immediately, and the phone was monitored and recorded.

These recordings are recorded in countless large-capacity hard disks in the huge electronic data center every day, and then sent to the relevant intelligence department for detailed analysis, and obtain the intelligence materials you want.

The "Dock" project and its monitoring methods are the least known of the monitoring projects implemented by the NSA, and even those intelligence experts involved have little knowledge of the project as a whole.

The information about the American people obtained by the "Dock" project may far exceed the other three. This is because the frequency of use of e-mail, online chat systems, and other media for communicating via the Internet, monitored by the "Dock" project, is much higher than that of ordinary telephones or mobile phones.

The so-called "metadata" of the Starwind Surveillance Project can accurately reveal the time, location, equipment used, and participants of the communication, but the content of the communication is not within the monitoring range.

NSA regards these "metadata" as "digital network information." The tracking and analysis of this information can actually know whether an ordinary American citizen is connected with a notorious terrorist.

Also based on this information, the individual’s health status, political or religious beliefs, confidential business negotiations, and even the existence of extramarital affairs can all be clear at a glance.

At the beginning, the "Star Wind Project" seemed to be a plan for domestic surveillance. After all, it seemed to the President that it was just a surveillance and intelligence gathering plan aimed at defending against domestic KB attacks.

But in the land of the USA, sometimes the president is not omnipotent.

After the "Starwind Project" was approved, the intelligence department carried some private activities in it. The "Deep Eye" project was one of such private goods.

The "Deep Eye" project is different from the above projects in that it not only monitors the whereabouts of objects through telephones, but also collects image data during monitoring, and the scope is no longer limited to the local area.

The intelligence department uses its huge capabilities and long enough tentacles to manipulate surveillance probes in major airports, ports and other entry and exit areas around the world through the technical means of implanting equipment into the back door.

The image data obtained by these surveillance probes will be sent directly back to the department responsible for the "Deep Eye" project in the USA through a secret network channel.

This project is a huge project.

However, in the world, only a superpower like the USA can do it and complete it.

Because the windows, CPUs and network root servers of USA are used all over the world, many key chips and electronic components are produced in USA.

The daily data generated by this kind of backdoor monitoring method that uses the goose plucking-style monitoring method is as simple as that of putting a sea in front of you, and you can't get a needle out of it.

However, the "Deep Eye" project has its own unique technology to solve this critical problem and make it a possibility.

The entire project ~lightnovelpub.net~ is also named based on this technology.

This is a technology called "Deep Eye" jointly developed by the intelligence department and senior hackers under its command.

The horror of this technology is that the messy intelligence agencies such as CIA, NSA, DIA, CSS, etc. all use the facial recognition data they have obtained over the years, as well as all the hostile personnel and KB elements that have been filmed overseas. The image information of all the people who want to monitor all hits the database of the "Deep Eye" project, as long as these objects appear in any important traffic point of the airport, dock, station, etc. where the "Deep Eye" project technology is deployed, the system will It will be caught immediately and a warning will be issued.

"It sounds like this is a face recognition system. It's nothing special." Qin Fei said, "It's just that the database is a bit larger, but there is no comparative facial data, so it's helpless, right?"

"Hey, you seem to underestimate the ability of our intelligence department, and the ability of'Deep Eye' too much." Mister said: "Deep Eye is called Deep Eye because it is not only capable of facial recognition, I can see through you..."

"See through?" Qin Fei was stunned.