You have a new Amazon product recommendation

Chapter 1016: Huge Starwind Project


"Speaking of the Deep Eye Project, I'll have to tell you about the entire Starwind Project."

Mister said."

Then say it, I'll listen to you."

Qin Fei looked at his watch: "There is a lot of time now, it seems that there is no progress in image analysis, our other arrangements must be pushed back, and we will talk about it when we find the enemy, now we have lost our night vision devices in the night when we can't see our fingers, where is the opponent hiding, who is it?"

We don't know anything. ”"Okay, then I'll explain the entire Starwind Project to you."

Mistre began to gush endlessly, explaining to Qin Fei the ins and outs of the entire Starwind Project.The "Starwind Project" is a huge surveillance program, which covers not only A's own country, but also all the places in the world where they can reach out, and the means used include all A's high-tech companies, and even their high-tech communication products.Many people thought that this plan was launched after the "911" war, but in fact, the prototype of this plan existed as early as the Cold War, but it was expanded in the name of counter-terrorism.For example, during the Cold War, in order to confront the former Soviet Union, A's intelligence department used the construction projects of telecommunications equipment companies around the world to set up a strange communication device in each telephone program-controlled box, which could record the telephone traffic records transmitted through this device, and the agents stationed in the local area could regularly disguise themselves as maintenance workers of the local telecommunications company and go to those boxes to pick up what they wanted.In addition, this kind of equipment made by A has another use, that is, whenever the infiltrated agents in the local area fall into nowhere to go and no communication equipment is available after their identities are exposed, they can directly go to the program-controlled box containing these equipment, and knock out a string of Moss codes by connecting to a specific line, and then send the distress message back to the CIA headquarters, so that the headquarters can send someone to rescue them.This kind of box has been working since the fall of the former Soviet Union, and in recent years, there have even been some informants who used to serve the CIA to send some information to the CIA through these ancient devices, of course, this is rare, after all, advanced communication equipment abounds now.These are the original forms of the entire "Starwind Project".It's just that after 911, when every high-level asked the intelligence community what could be done to control the KB attack, the NSA and CIA people stirred up the whole old plan and added new elements to the president's desk.In addition to the "Prism" project exposed by CIA intelligence analyst Edward Snowden, the scope of the other three projects in the "Starwind Project" has also radiated to modern communication tools.These include the "main road" project, which focuses on telephone surveillance, and the "dock" project, which focuses on Internet surveillance.Both rely on the processing of "metadata" information.The so-called "metadata" can reveal exactly when and where the communication is used, the equipment used, and the participants, but the content of the communication is not within the scope of the monitoring.The "Main Road" and "Dock" projects store and analyze hundreds of millions of exabytes of "metadata" on communications and the Internet, respectively.

(In the semantics of telephone and Internet surveillance, metadata mainly refers to the time, place, equipment used, participants, etc. of calls or communications, and does not include the content of phone calls or emails.) )In June 2013, Snowden provided a top-secret court order to the British Empire's Guardian newspaper showing that the N.S.A.

(Department of Homeland Security) collected phone records from millions of U.S. customers, including calls made within the U.S. and calls made from home to foreign countries, through Verizon, the country's largest telecommunications operator.Verizon Corporation was one of the original intelligence providers for the "Main Road" project.The "nuclear" project is different from the "main road" and "dock" projects.The scope of the "nuclear" project is not as broad as the first two, but it is mainly focused on the acquisition of content information.The "nuclear" project implements daily monitoring by intercepting calls and the places mentioned by the caller.The "nuclear" project is responsible for intercepting the content and keywords of the conversations of the callers.In other words, NSA, CIA and other intelligence agencies establish a sensitive thesaurus, and then when a phone user triggers a keyword in this sensitive thesaurus in a conversation, such as "allāh" or "alhakbar", the system will immediately automatically detect it, and monitor and record the call.These recordings are recorded on a daily basis in numerous high-capacity hard drives in huge electronic data centers, and then sent to the relevant intelligence services for detailed analysis, in which they can obtain the intelligence information they want.The "dock" project and its surveillance methods are the least known of the surveillance programs carried out by the NSA, and even those intelligence experts involved know little about the project as a whole.The Wharf project may have obtained far more information about Americans than the other three.This is because the e-mail, online chat system, and other mediums used to communicate via the Internet are used far more frequently than ordinary telephones or mobile phones.The so-called "metadata" of the Starwind Surveillance Program can reveal exactly when and where a communication is used, what equipment is used, and who participated, but the content of the communication is not within the scope of the monitoring.The NSA treats this "metadata" as "digital network information."

The tracking and analysis of this information can really tell whether an ordinary American citizen has any connection to a notorious terrorist.Based on this information, it is also possible to see at a glance the individual's health, political or religious beliefs, confidential business negotiations, and even the existence of extramarital affairs.At first, "Project Starwind" appeared to be just a plan for domestic surveillance, after all, it made the president look like it was just a surveillance and intelligence-gathering program designed to defend against domestic KB attacks.But in the land of a, the president is sometimes not omnipotent.After the approval of the "Starwind Project", the intelligence department carried some private work in it, and the "Deep Eye" project was one of such private goods.The difference between the "Deep Eye" project and the above projects is that it not only monitors the whereabouts of the subject through devices such as telephones, but also collects the image data in the surveillance, and the scope is no longer limited to the local area.The intelligence department uses its huge capabilities and long enough tentacles to manipulate the surveillance probes in major airports, ports, and other entry and exit areas around the world through the technical means of equipment implanted with backdoors.The footage obtained by these surveillance probes is sent directly back to the local "Deep Eye" project department through a secret network channel.This project is a huge project.However, only a superpower like A in the world can do it and do it.Because the world is using A's windows, CPUs, and network root servers, many of the key chips and electronic components are produced in A.The data generated every day by using the backdoor to pluck the goose is so amazing that it's like putting a sea in front of you, and you can't get a needle out of it.However, the Deep Eye project has its own unique technology to solve this critical problem and make it possible.And the whole project is also named after this technology.This is a technology called "Deep Eye", which was jointly developed by the intelligence services and their high-level hackers.The horror of this technology lies in the fact that the messy intelligence departments such as CIA, NSA, DIA, CSS, etc., all of the facial recognition data they have obtained over the years, as well as all the hostile personnel and KB elements that have been filmed overseas, in short, all the image information of the people they want to monitor are all hit in the database of the "Deep Eye" project, as long as these objects appear in any airport, dock, station and other traffic points where the "Deep Eye" project technology is put in, the system will immediately capture it.

And issue a warning."

It sounds like this is a facial recognition system, nothing special."

Qin Fei said, "It's just that the database is a bit larger, but there is no comparative facial data, so it's helpless, right?"

”"Hehe, you seem to underestimate the capabilities of our intelligence department, and underestimate the capabilities of the 'Deep Eye'.""

Deep eyes are called deep eyes because they can not only recognize your face, but also see through your ......"

"See through?

”Qin Fei was stunned.