Alien Paradise.
Chapter 124 Devil's Tracking Technique
Chapter 124 Devil's Tracking Technique
To put it simply, after the advent of Internet technology, it quickly attracted widespread attention from various countries, including many intelligence agencies that rely on information for a living.While others are still praising its magic and convenience, MI6 is worried that this technology is not in the hands of Britain, which will lead to huge loopholes in their intelligence competition.
At the beginning of the document, the founders of the project even compared this technical disadvantage to the cipher machines leaked by Japan in World War II.They believe that in time, the Internet will completely replace mail, telegrams, and wired telephone communications.Even if it is an allied country that invented it, there is no guarantee that the other party will not steal its secrets.
So the Sunflower Project was put forward.
MI6 intends to cultivate a group of people with completely different identities in reality. These people are different from half-way joiners and regular employees: when MI6 does not use them, they are no different from ordinary people and will spend their lives normally. life.In non-special circumstances, intelligence agencies will not take the initiative to recruit them, because this may lead to their identities being exposed.Only when these people feel that they must contact MI6, will they instantly transform from an ordinary person into an espionage worker.
According to the plan, they will be pure white lurkers of the information age.
Diad Flynn was one of the first proposers.
So the question is, since these people have nothing to do with intelligence agencies since they were young, how can they become the hidden power of MI6 and even pledge their loyalty to it?
Sunflower's solution is also very simple, that is, distributed training is based on family units, so the creators did not recruit personnel from orphans like their peers, but chose people in the industry-veterans and high-level volunteers in intelligence agencies.Their children are also divided into two categories, corresponding to grassroots intelligence and upper-level intelligence respectively. The first category is about 600 people, and the rest are the second category.
Seeing this, Chaoyang has to admire the brains of these people. Veterans and spies can train children by themselves and instill loyalty education. There is really no need for MI6 to intervene in it.The growth path of these children will be the same as that of ordinary people...studying, graduating, working, and getting married. The only difference is that they have mastered all the knowledge to become an intelligence worker in their spare time, and they all know that they have a mission.
Their parents, on the other hand, lived in an era when the Internet was not popularized, and they might not be entered into the system until long after they changed jobs. If they did not publicize it themselves, few people would know that an old carpenter or farmer in the town had been a veteran before.
As for why there are two types of people, it also makes sense.
Because it is difficult for people at the bottom to mix into the upper circles, naturally they cannot get access to high-level intelligence.What's more, intelligence personnel can't work blindfolded. They always know what kind of information the agency needs. This means that MI6 has to regurgitate some of their secrets. intelligence.
George Flynn obviously joined in as his father's successor. Judging from his age, he was already in his thirties when the plan was implemented, so it was impossible for him to be a pure white lurker.In addition, as an MI6 executive, he retired very early, as if he had been fired early.
Chaoyang arranged the ages of the three people one by one, and found that Taylor's age basically coincided with the time when George Flynn retired.
If Taylor is the seed of the Sunflower Project, it makes sense that he wouldn't be on the roster.
This is also the reason why Chaoyang has never been able to find the opponent's flaws in the network information.
In order to confirm this, he turned around and hacked into the server of the Central Bureau of Statistics in Britain, and retrieved the registered identities of the Taylor family from it.The data here is public information, which is highly tied to the ID card. It is a pity that the information about his father only has one name: Edmerk Taylor, who is a factory operator, and there is no photo information.
This actually aroused Chaoyang's fighting spirit.
He found the elementary school and middle school where Taylor was studying, went back in time to the target's childhood, and began to tirelessly search through the huge amount of dusty materials.
It was a yellowed color photo.
Messy and broken.
In 1990, there were no electronic archives in schools, and mobile phones and the Internet were not popularized among the student population.The materials he found basically came from the blurred photos of the students when the children grew up, and scanned them into personal space or social networking sites as a commemoration, so that they could be searched by Chaoyang.
This search took most of the day.
Until the early hours of the morning, Chaoyang's gaze finally stopped on an almost yellow-and-white photo.
It was the aftermath of an elementary school ball game, one of which was also Taylor's class team.The children ran towards their parents, and because the shutter was pressed in motion, the photo was out of focus and looked slightly blurry.Chaoyang didn't see Taylor's face, but he saw a familiar man.This person was wearing a suit, standing upright, like an old gentleman, waiting for the child to embrace him.
Even without comparison software, he could recognize that this person was George Flynn.
……
According to the usual practice, Kells opened the fourth-level security door of the base to conduct daily inspections of the machines in the room.
This is the core area of the Waxel Cross Building, and it is impossible for outsiders to enter here, so the most important thing inspectors need to guard against is rats—this is no joke. Rats have far more records of destroying lines than people.But since infrared rat repellents have been installed in the building's ventilation ducts, the significance of this work has become minimal.
Of course, the inspection also includes whether the plug-in wire is loose, whether the temperature of the machine is normal, whether there is any abnormality in the monitoring and air conditioning, and so on.But Kells suspects the machines will be fine until he gets old enough to retire or get fired.
After all, they are much more durable than humans.
At this moment, the time is 7 o'clock in the evening, and the shift is approaching.This was considered his last job before leaving get off work, so he checked it a little carelessly. After turning around and finding nothing abnormal, he planned to sign his name on the inspection form.
At this moment, Kells suddenly noticed a green light flashing from a data acquisition machine by the wall.
what happened?
He remembered that this misfit device was used to check the number of visits to the confidential database.Every time an agent needs to view top-secret information, he needs to apply to his superiors, and the number of times the agent has seen it will be recorded by the collection machine for verification.In order to prevent fraud, the device is not connected to the host itself, and what is monitored is the number of electrons flowing through the hard disk port.
Compared with the computer in the computer room, it is more like a paper tape punching machine, which is ancient and backward.Its indicator goes up by a number each time a query is detected and cannot be reset externally or adjusted.
And the flashing green light proves that electrons are passing through.
But now there is no agent in the room at all.
Kells rubbed his eyes, thinking he had made a mistake.
He waited a few seconds, then saw the machine blink green again.
Someone is accessing the most confidential mainframe in the building?What a joke!These machines are in a state of physical isolation, and only when they come to this room with special equipment can they connect to the host database!
Obviously, the collection device is broken.
Kells turned on his radio and called his colleagues in the office, "Hey, Ike, help me check the number of times the collector returns."
But the other party didn't answer, and there was only a sizzle of electromagnetic noise in the receiver.
"Damn, there's no signal." He cursed and decided to come by himself.
The device is covered with an EMP shielding shell, and the unlocking buckle needs to be opened manually to lift the shell and see the indicator reading inside.This operation is not troublesome and can be completed in ten seconds. He plans to write down the numbers first, and then go out to check with the past records.
However, it was this glance that made Kells' back wet with sweat instantly!
Although he doesn't remember the exact number, the last record was a four-digit number starting with six, and the first digit "6" has not changed for a long time.
At this moment, he saw a reading of 12316.
Four digits turned into five!
(End of this chapter)
To put it simply, after the advent of Internet technology, it quickly attracted widespread attention from various countries, including many intelligence agencies that rely on information for a living.While others are still praising its magic and convenience, MI6 is worried that this technology is not in the hands of Britain, which will lead to huge loopholes in their intelligence competition.
At the beginning of the document, the founders of the project even compared this technical disadvantage to the cipher machines leaked by Japan in World War II.They believe that in time, the Internet will completely replace mail, telegrams, and wired telephone communications.Even if it is an allied country that invented it, there is no guarantee that the other party will not steal its secrets.
So the Sunflower Project was put forward.
MI6 intends to cultivate a group of people with completely different identities in reality. These people are different from half-way joiners and regular employees: when MI6 does not use them, they are no different from ordinary people and will spend their lives normally. life.In non-special circumstances, intelligence agencies will not take the initiative to recruit them, because this may lead to their identities being exposed.Only when these people feel that they must contact MI6, will they instantly transform from an ordinary person into an espionage worker.
According to the plan, they will be pure white lurkers of the information age.
Diad Flynn was one of the first proposers.
So the question is, since these people have nothing to do with intelligence agencies since they were young, how can they become the hidden power of MI6 and even pledge their loyalty to it?
Sunflower's solution is also very simple, that is, distributed training is based on family units, so the creators did not recruit personnel from orphans like their peers, but chose people in the industry-veterans and high-level volunteers in intelligence agencies.Their children are also divided into two categories, corresponding to grassroots intelligence and upper-level intelligence respectively. The first category is about 600 people, and the rest are the second category.
Seeing this, Chaoyang has to admire the brains of these people. Veterans and spies can train children by themselves and instill loyalty education. There is really no need for MI6 to intervene in it.The growth path of these children will be the same as that of ordinary people...studying, graduating, working, and getting married. The only difference is that they have mastered all the knowledge to become an intelligence worker in their spare time, and they all know that they have a mission.
Their parents, on the other hand, lived in an era when the Internet was not popularized, and they might not be entered into the system until long after they changed jobs. If they did not publicize it themselves, few people would know that an old carpenter or farmer in the town had been a veteran before.
As for why there are two types of people, it also makes sense.
Because it is difficult for people at the bottom to mix into the upper circles, naturally they cannot get access to high-level intelligence.What's more, intelligence personnel can't work blindfolded. They always know what kind of information the agency needs. This means that MI6 has to regurgitate some of their secrets. intelligence.
George Flynn obviously joined in as his father's successor. Judging from his age, he was already in his thirties when the plan was implemented, so it was impossible for him to be a pure white lurker.In addition, as an MI6 executive, he retired very early, as if he had been fired early.
Chaoyang arranged the ages of the three people one by one, and found that Taylor's age basically coincided with the time when George Flynn retired.
If Taylor is the seed of the Sunflower Project, it makes sense that he wouldn't be on the roster.
This is also the reason why Chaoyang has never been able to find the opponent's flaws in the network information.
In order to confirm this, he turned around and hacked into the server of the Central Bureau of Statistics in Britain, and retrieved the registered identities of the Taylor family from it.The data here is public information, which is highly tied to the ID card. It is a pity that the information about his father only has one name: Edmerk Taylor, who is a factory operator, and there is no photo information.
This actually aroused Chaoyang's fighting spirit.
He found the elementary school and middle school where Taylor was studying, went back in time to the target's childhood, and began to tirelessly search through the huge amount of dusty materials.
It was a yellowed color photo.
Messy and broken.
In 1990, there were no electronic archives in schools, and mobile phones and the Internet were not popularized among the student population.The materials he found basically came from the blurred photos of the students when the children grew up, and scanned them into personal space or social networking sites as a commemoration, so that they could be searched by Chaoyang.
This search took most of the day.
Until the early hours of the morning, Chaoyang's gaze finally stopped on an almost yellow-and-white photo.
It was the aftermath of an elementary school ball game, one of which was also Taylor's class team.The children ran towards their parents, and because the shutter was pressed in motion, the photo was out of focus and looked slightly blurry.Chaoyang didn't see Taylor's face, but he saw a familiar man.This person was wearing a suit, standing upright, like an old gentleman, waiting for the child to embrace him.
Even without comparison software, he could recognize that this person was George Flynn.
……
According to the usual practice, Kells opened the fourth-level security door of the base to conduct daily inspections of the machines in the room.
This is the core area of the Waxel Cross Building, and it is impossible for outsiders to enter here, so the most important thing inspectors need to guard against is rats—this is no joke. Rats have far more records of destroying lines than people.But since infrared rat repellents have been installed in the building's ventilation ducts, the significance of this work has become minimal.
Of course, the inspection also includes whether the plug-in wire is loose, whether the temperature of the machine is normal, whether there is any abnormality in the monitoring and air conditioning, and so on.But Kells suspects the machines will be fine until he gets old enough to retire or get fired.
After all, they are much more durable than humans.
At this moment, the time is 7 o'clock in the evening, and the shift is approaching.This was considered his last job before leaving get off work, so he checked it a little carelessly. After turning around and finding nothing abnormal, he planned to sign his name on the inspection form.
At this moment, Kells suddenly noticed a green light flashing from a data acquisition machine by the wall.
what happened?
He remembered that this misfit device was used to check the number of visits to the confidential database.Every time an agent needs to view top-secret information, he needs to apply to his superiors, and the number of times the agent has seen it will be recorded by the collection machine for verification.In order to prevent fraud, the device is not connected to the host itself, and what is monitored is the number of electrons flowing through the hard disk port.
Compared with the computer in the computer room, it is more like a paper tape punching machine, which is ancient and backward.Its indicator goes up by a number each time a query is detected and cannot be reset externally or adjusted.
And the flashing green light proves that electrons are passing through.
But now there is no agent in the room at all.
Kells rubbed his eyes, thinking he had made a mistake.
He waited a few seconds, then saw the machine blink green again.
Someone is accessing the most confidential mainframe in the building?What a joke!These machines are in a state of physical isolation, and only when they come to this room with special equipment can they connect to the host database!
Obviously, the collection device is broken.
Kells turned on his radio and called his colleagues in the office, "Hey, Ike, help me check the number of times the collector returns."
But the other party didn't answer, and there was only a sizzle of electromagnetic noise in the receiver.
"Damn, there's no signal." He cursed and decided to come by himself.
The device is covered with an EMP shielding shell, and the unlocking buckle needs to be opened manually to lift the shell and see the indicator reading inside.This operation is not troublesome and can be completed in ten seconds. He plans to write down the numbers first, and then go out to check with the past records.
However, it was this glance that made Kells' back wet with sweat instantly!
Although he doesn't remember the exact number, the last record was a four-digit number starting with six, and the first digit "6" has not changed for a long time.
At this moment, he saw a reading of 12316.
Four digits turned into five!
(End of this chapter)
You'll Also Like
-
The Vicious Young Lady Who Had Been Spoiled Awakened
Chapter 358 9 hours ago -
The Growth System Comes at the Age of Thirty
Chapter 132 18 hours ago -
Family Immortal Cultivation: Li Clan
Chapter 1035 1 days ago -
Longevity, starting from the blood contract turtle
Chapter 609 1 days ago -
Wanjie Technology System.
Chapter 701 1 days ago -
On the Avenue
Chapter 411 1 days ago -
Diary of the Improper Monster Girl Transformation
Chapter 253 1 days ago -
Oh no, the young villain got the heroine's script!
Chapter 915 1 days ago -
Having a child makes you invincible
Chapter 329 1 days ago -
Just a quick calculation, you are a fugitive!
Chapter 657 1 days ago