The FBI teaches you lie detection, people reading and intelligence skills
Chapter 66 High-Tech: Unexpectedly Obtained Information
Chapter 66 High-Tech: Unexpectedly Obtained Information (1)
The development of science and technology has opened up the horsepower for the evolution of intelligence personnel technology and intelligence personnel tools, so that intelligence personnel can obtain intelligence by stealth.
§§§ Section [-] Network intelligence personnel, the trump card army in the information age
After entering the information age, network intelligence personnel have become the new darling of various intelligence personnel categories.The computer network provides intelligence personnel with efficient and fast means, and thus triggers a revolution in the means of intelligence personnel.Cyber intelligence personnel only need a computer, a telephone line (or a mobile phone with Internet access), plus their devilish brains, and they can steal the enemy's secrets in an instant and turn the world upside down.Most cyber intelligence personnel are master hackers.A "hacker" organization called "Download Master" also claimed to have broken into the computer system of the US Department of Defense and downloaded a software in the system that controls the Global Positioning System.In addition, in February 1998, Tenenbaum, an 2-year-old Israeli youth who claimed to be an "analyst", successfully broke into the computer network of the US Department of Defense.
In such a rapidly changing information age, the networked society and the resulting networked culture not only profoundly affect people's thinking and behavior, but also have a profound impact on state relations and national security.
The network has changed the way of human warfare, that is, the threat of war without firing a shot is already in front of us.When your network is under attack, you might not even know it.Compared with that kind of blatant force attack, cyber attack seems to be much more "civilized".In cyber warfare, neither the sound of roaring guns nor the billowing smoke of gunpowder can be heard, but only the tapping of the keyboard and the sliding of the mouse.However, the "lethality" brought about by cyber attacks is often unmatched by traditional attacks, and it is also more destructive.Cyber attacks can lead to a country's political loss of control, economic chaos, and loss of military combat effectiveness...
The U.S. military is the army most dependent on computer networks in the world. From military command, weapons and equipment, to personnel transfer, and payment of military salaries, it is highly dependent on computer networks.The U.S. military has the world's largest computer network system, known as the "Defense Information Infrastructure". This huge system consists of 210 million computers, 1 local area networks, 100 wide area networks, 200 command centers and 16 large-scale computer center.During the Gulf War in 1991, free intelligence personnel from the Netherlands used computer networks to steal a large amount of military intelligence from the US military, collecting data on personnel transfers, logistics and weapon systems in several battles, as well as "Patriot" missiles The launch situation and information about nuclear weapons, "Desert Shield" and "Desert Storm" operations. The first act of the Iraq war in March 2003 - the "beheading operation" of the United States was temporarily launched by the Americans based on the information on Saddam's whereabouts provided by network intelligence personnel.
At the same time, according to the Russian Federal Security Service, Russia has arrested computer hackers who delivered Russian classified information to the US Central Intelligence Agency.The hacker is Lithuanian.He is said to have confessed in detail that he obtained secrets by illegally hacking into the computer system of the Russian Federal Security Service.While passing the intelligence to the Lithuanian Ministry of State Security, he also sent a copy to the CIA.The information stolen by the hacker includes the organizational structure of the Russian Federal Security Service, the list of all working members, and some relevant content such as Russia's countermeasures against Western countries.It is worth noting that the US Central Intelligence Agency can regularly obtain timely and effective intelligence from the Russian Federal Security Service through hackers.The hacker also admitted that he had attempted to be recruited as an intelligence agent for the Russian FSB during a secret meeting in Poland.
In the economic sphere, the activities of intelligence agents are equally rampant.In the contemporary international society, the economic system of almost every country is connected with the economies of other countries through computer, optical fiber communication, satellite and other information technology means to form a world economic network.
In this case, countries with advanced information technology can use the Internet as a means to defeat countries with backward information technology, or control the economic operation of these low-end countries.As economic operations rely more and more closely on the network, network security has a greater direct impact on economic security.
According to the statistics of the US Federal Bureau of Investigation, the economic losses caused by computer network security problems in the United States are as high as 75 billion U.S. dollars every year.American network security experts claim that a successful "cyber terror" activity may paralyze the entire financial market in the United States or the network of the Civil Aviation Administration of the United States.In China, the CIH virus alone once caused 36 computers to be attacked, and the economic loss reached 12 billion yuan.It can be said that network security has risen to an overall issue related to the country's political stability, social security, and orderly economic operation.
The wanton proliferation of computer viruses and ubiquitous "hackers" are making the network more vulnerable.Former U.S. President Clinton once said: "The network and computer are a double-edged sword. It has brought huge benefits to the world, but at the same time it will also become a powerful weapon for 'hackers' and terrorists." In the ubiquitous network In the world, "hackers" who have no access to the Internet are the biggest and most serious threat to network security.
In the ever-expanding computer network space, there are "hackers" almost everywhere, and they are attacked by "hackers" everywhere.A large amount of confidential information is stored and transmitted in computer networks, which attracts the attention of intelligence personnel from various countries, and computer network intelligence personnel emerge as the times require.During the Gulf War, free intelligence personnel from the Netherlands used computer networks to steal a large amount of military information from the US military. In October 2000, the world's leading computer software company - Microsoft Corporation of the United States was stolen by "hackers" with the latest versions of Windows and Office operating systems.And a computer program called "intelligence officer" can record all operations on the computer, including passwords.It never shows up, and computer users simply don't know it.
"Millipede" intelligence agents "Millipede" intelligence agents are actually a type of cyber "hacker".It once invaded India's nuclear industry sector, and stole many core secrets from the computer network of the US military's "NATO Air Defense Command Center", including core secrets such as data and information on all nuclear warheads pointed to by the United States against Russia.In future cyber warfare, "millipede" intelligence personnel will take on dual tasks at the same time, that is, after purposefully stealing important military secrets, they will use "logic bombs" that can devour computer data frantically, causing large-scale network congestion, and Through network transmission, the "magnetic explosion bomb" that paralyzes the network system in a short period of time is used as a means to completely disable the enemy's command and control system.
"Robot" spies are an inevitable consequence of the development of nanotechnology.Such as "spy grass", "spy mosquito", "intelligence officer fly", "spy ant soldier", "miniature reconnaissance device" and so on.It is a "miniature attack robot" capable of destroying the enemy's network system and collecting intelligence information. It is the size of a coin.At present, Swedish researchers have successfully developed the world's smallest robot.
Because its length is less than 1 millimeter, it is called a "robot bug". It has 8 legs and can move at a speed of 1 centimeter per second or fly at a speed of 100 centimeters per second.It could end up being one of the cyber intelligence operatives.An ultra-miniature camera is installed on its top, and the controller can allow it to go deep into the enemy's rear for intelligence personnel activities, or let it directly enter the enemy's command and control center, collect enemy intelligence, and attack and destroy the enemy according to instructions The network system makes the enemy lose the ability to control its own troops in real time.
In addition, there are "hybrid" intelligence personnel under consideration, etc., which are all ways to successfully obtain information.
From the comparison of cyber intelligence personnel and traditional intelligence personnel, we can find that they have distinct characteristics: cyber intelligence personnel are well concealed and difficult to expose.The use of computer networks to steal intelligence leaves almost no trace and usually does not cause damage to the target computer network, so it is difficult to detect and distinguish.
Network intelligence personnel have high work efficiency and great threats. Once computer network intelligence personnel invade important computer systems, especially access privileges, intelligence personnel can use this as a base to continuously obtain a large amount of highly confidential information, and victims The latter is often unaware of the loss he has suffered.In theory, cyber intelligence officers could try to break into an enemy computer network from anywhere in the world where there is a computer network.In this way, computer network intelligence personnel can steal the other party's confidential information while sitting in a clean laboratory in the country without worrying about their own safety.Cyber intelligence personnel can steal the other party's core secrets while enjoying coffee thousands of kilometers away, and start a war quietly.
This kind of network intelligence personnel who has neither gunpowder smoke nor noise will also make people turn pale.Although cyber intelligence personnel cannot use pistols or poison to kill opponents like ordinary intelligence personnel, they can take away or destroy years of accumulation on which the opponent relies for survival and development in an instant.Paralyze your opponent's website.
In the future, perhaps no kind of disaster can be more terrible than the paralysis of the network.Intelligence personnel are the product of war, and their own value is directly proportional to the intensity of the war.Cyber intelligence officers are a brand new field.In cyber intelligence personnel warfare, knowledge and technology are the fundamental factors that determine the outcome of a war.The future society is a network society, and it will still develop amid fierce competition, and network intelligence personnel will always be a terrifying force that all parties need to seriously study and deal with in the future competition.
§§§Session [-] "Super Intelligence Officer" Melee in Space
With the development of science and technology, intelligence personnel satellites have entered people's sight. It has advantages that traditional intelligence personnel methods cannot match. Intelligence personnel satellites fly around the earth at an altitude of more than hundreds of kilometers, and the area covered by a single photo of it is It is worth hundreds of aerial photos, and the amount of information contained in it is conceivable.
Intelligence personnel satellites can not only conduct large-scale coverage surveys on the earth's surface, but also conduct repeated detailed investigations on specific targets, and are not interfered by various factors such as the atmosphere, so they can take extremely high-definition photos. Infrared sensors on satellites can strip off any camouflage on missile launch sites, and even detect stoves, electric clocks, and radios that emit heat in military facilities.Therefore, intelligence personnel satellites have been loved by intelligence agencies of various countries for quite a long time.
On October 1957, 10, the former Soviet Union launched the world's first artificial earth satellite, Sputnik 4, into space with a carrier rocket.The United States followed closely by sending the "Pioneer" satellite into orbit around the earth in March 1. This satellite is still operating normally in space today.After these two satellites were put into space, all countries are scrambling to set foot in outer space.U.S. Senator Lyndon Johnson once publicly commented on this: "Whoever gains the final status of controlling space has gained control of the earth, whether it is for the purpose of dictatorship or the preservation of liberty. "This sentence reveals the essence of space competition.
With the launch of the artificial satellite, it was soon used in the field of international intelligence personnel and became the most modern stealing tool.Satellites used for intelligence personnel activities are called intelligence personnel satellites or reconnaissance satellites.
On February 1959, 2, at Vandenberg Air Force Base in California, the United States, the first intelligence satellite "Discovery 28" in human history soared into the clouds. In October 1, "Discovery 1960" carried another intelligence personnel satellite "Samos" into the blue sky. The "Samos" intelligence personnel satellite can carry out a large number of audio and video recordings during space operations. The information collected in one year is dozens of times more.
The former Soviet Union was not to be outdone. In 1962, the former Soviet Union launched the "Cosmos" intelligence personnel satellite into space to conduct high-altitude intelligence personnel reconnaissance on the United States and Canada.By the end of 1982, the United States and the former Soviet Union had launched 373 and 796 satellites for full-time intelligence personnel respectively, with a total of 1169 satellites.These more than 1000 "super intelligence personnel" monitor every corner of the earth day and night at an altitude of several hundred kilometers.
According to the statistics of relevant experts, 70% to 80% of the artificial satellites launched by various countries are intelligence personnel satellites.The former Soviet Union's "Cosmos 596" intelligence personnel satellite shined brilliantly in the Fourth Middle East War. On October 1973, 10, Egypt and Syria launched the fourth Middle East war, and Israel was almost wiped out. One of the reasons was that before the war, the former Soviet Union launched a "Cosmos 6" intelligence personnel satellite, whose location It is in the sky above the area that may become a battlefield.The former Soviet Union used this intelligence personnel satellite to steal Israel's secrets for Egypt and send intelligence to Egypt in time.Under the "care" of intelligence personnel satellites like eyes, Israel's failure is almost a foregone conclusion. During the Falklands War between Britain and Argentina in 596, the former Soviet Union and the United States frequently launched intelligence personnel satellites to closely monitor the battle situation in the South Atlantic Ocean, and provided Britain and Argentina with satellite photos of the enemy's military situation.During the war, the former Soviet Union successively launched the "Cosmos-1982" and "Cosmos-1365" marine surveillance satellites to detect the military battle between Britain, Britain and Argentina, and immediately reported the relevant information obtained by the British army. Provided to the Argentine army, so that the Argentine Air Force sank the famous "Sheffield" destroyer in the British task force in one fell swoop.It can be seen that the role of intelligence personnel satellites in warfare can be seen in general.
The frightening and amazing thing about satellites for intelligence personnel is that they are more detailed, more high-tech, and more sensitive.The photos taken by the high-altitude camera of the intelligence personnel's satellite can be enlarged to identify the license plate number on the ground car; the infrared sensing equipment on the intelligence personnel's satellite can photograph various military facilities on the ground after being camouflaged. There is no bunker in the eyes of the satellite; the electronic signal interception equipment on the satellite of the intelligence personnel can intercept the radio communication signals of various countries and the telemetry and remote control signals of space vehicles.
Intelligence personnel satellites have brought about a fundamental and great revolution in the means of intelligence work.The intelligence personnel agencies of some countries also secretly communicate with the intelligence personnel lurking in other countries through the intelligence personnel satellites, and direct the intelligence personnel to carry out secret activities, and the intelligence personnel lurking in other countries can also use the radio system on the intelligence personnel satellites , to directly ask for instructions or transmit information to its superior commanding authority.In this way, not only the time for information transmission is shortened, but also the risk of being intercepted by the country's counterintelligence personnel during the information transmission process is reduced.
§§§Section [-] Intelligence Agents Hiding in the Air
In the field of intelligence personnel's activities, "participation" in the communication of the enemy plays an important role.Because for the keepers of secrets, no matter how mysterious the research and development process of a certain technology or the decision-making process of a certain strategy is, and how tight-lipped the insiders who know the secrets are, it is meaningless to "seal" the secrets. The value of a secret is that it can be done without the knowledge of others.
However, contradictions arise here. The implementation of secrets is inseparable from extensive communication among insiders. The process of communication is a process of communication, and certain media of communication are indispensable in this process.And this medium of communication has become the main focus of intelligence personnel's espionage. No wonder someone said humorously: "It's better to hide in the air when he speaks than to pry open his mouth." "The intelligence officer is a typical communications intelligence officer.
It is no exaggeration to say that the US CIA can be well-deserved as the spokesperson of the image of communications intelligence personnel, and this image is established by communication "bugs" of various shapes, a considerable part of which is aimed at China.Among the tools of these communications and intelligence personnel, the simple ones are just fake twigs made of fiberglass, which were once used to collect important intelligence from the Chinese embassy in the United States, and the complex ones are like a $[-] million intelligence personnel satellite.Using these comprehensive communications intelligence personnel tools, the CIA has established a comprehensive communications intelligence personnel network in China.
(End of this chapter)
The development of science and technology has opened up the horsepower for the evolution of intelligence personnel technology and intelligence personnel tools, so that intelligence personnel can obtain intelligence by stealth.
§§§ Section [-] Network intelligence personnel, the trump card army in the information age
After entering the information age, network intelligence personnel have become the new darling of various intelligence personnel categories.The computer network provides intelligence personnel with efficient and fast means, and thus triggers a revolution in the means of intelligence personnel.Cyber intelligence personnel only need a computer, a telephone line (or a mobile phone with Internet access), plus their devilish brains, and they can steal the enemy's secrets in an instant and turn the world upside down.Most cyber intelligence personnel are master hackers.A "hacker" organization called "Download Master" also claimed to have broken into the computer system of the US Department of Defense and downloaded a software in the system that controls the Global Positioning System.In addition, in February 1998, Tenenbaum, an 2-year-old Israeli youth who claimed to be an "analyst", successfully broke into the computer network of the US Department of Defense.
In such a rapidly changing information age, the networked society and the resulting networked culture not only profoundly affect people's thinking and behavior, but also have a profound impact on state relations and national security.
The network has changed the way of human warfare, that is, the threat of war without firing a shot is already in front of us.When your network is under attack, you might not even know it.Compared with that kind of blatant force attack, cyber attack seems to be much more "civilized".In cyber warfare, neither the sound of roaring guns nor the billowing smoke of gunpowder can be heard, but only the tapping of the keyboard and the sliding of the mouse.However, the "lethality" brought about by cyber attacks is often unmatched by traditional attacks, and it is also more destructive.Cyber attacks can lead to a country's political loss of control, economic chaos, and loss of military combat effectiveness...
The U.S. military is the army most dependent on computer networks in the world. From military command, weapons and equipment, to personnel transfer, and payment of military salaries, it is highly dependent on computer networks.The U.S. military has the world's largest computer network system, known as the "Defense Information Infrastructure". This huge system consists of 210 million computers, 1 local area networks, 100 wide area networks, 200 command centers and 16 large-scale computer center.During the Gulf War in 1991, free intelligence personnel from the Netherlands used computer networks to steal a large amount of military intelligence from the US military, collecting data on personnel transfers, logistics and weapon systems in several battles, as well as "Patriot" missiles The launch situation and information about nuclear weapons, "Desert Shield" and "Desert Storm" operations. The first act of the Iraq war in March 2003 - the "beheading operation" of the United States was temporarily launched by the Americans based on the information on Saddam's whereabouts provided by network intelligence personnel.
At the same time, according to the Russian Federal Security Service, Russia has arrested computer hackers who delivered Russian classified information to the US Central Intelligence Agency.The hacker is Lithuanian.He is said to have confessed in detail that he obtained secrets by illegally hacking into the computer system of the Russian Federal Security Service.While passing the intelligence to the Lithuanian Ministry of State Security, he also sent a copy to the CIA.The information stolen by the hacker includes the organizational structure of the Russian Federal Security Service, the list of all working members, and some relevant content such as Russia's countermeasures against Western countries.It is worth noting that the US Central Intelligence Agency can regularly obtain timely and effective intelligence from the Russian Federal Security Service through hackers.The hacker also admitted that he had attempted to be recruited as an intelligence agent for the Russian FSB during a secret meeting in Poland.
In the economic sphere, the activities of intelligence agents are equally rampant.In the contemporary international society, the economic system of almost every country is connected with the economies of other countries through computer, optical fiber communication, satellite and other information technology means to form a world economic network.
In this case, countries with advanced information technology can use the Internet as a means to defeat countries with backward information technology, or control the economic operation of these low-end countries.As economic operations rely more and more closely on the network, network security has a greater direct impact on economic security.
According to the statistics of the US Federal Bureau of Investigation, the economic losses caused by computer network security problems in the United States are as high as 75 billion U.S. dollars every year.American network security experts claim that a successful "cyber terror" activity may paralyze the entire financial market in the United States or the network of the Civil Aviation Administration of the United States.In China, the CIH virus alone once caused 36 computers to be attacked, and the economic loss reached 12 billion yuan.It can be said that network security has risen to an overall issue related to the country's political stability, social security, and orderly economic operation.
The wanton proliferation of computer viruses and ubiquitous "hackers" are making the network more vulnerable.Former U.S. President Clinton once said: "The network and computer are a double-edged sword. It has brought huge benefits to the world, but at the same time it will also become a powerful weapon for 'hackers' and terrorists." In the ubiquitous network In the world, "hackers" who have no access to the Internet are the biggest and most serious threat to network security.
In the ever-expanding computer network space, there are "hackers" almost everywhere, and they are attacked by "hackers" everywhere.A large amount of confidential information is stored and transmitted in computer networks, which attracts the attention of intelligence personnel from various countries, and computer network intelligence personnel emerge as the times require.During the Gulf War, free intelligence personnel from the Netherlands used computer networks to steal a large amount of military information from the US military. In October 2000, the world's leading computer software company - Microsoft Corporation of the United States was stolen by "hackers" with the latest versions of Windows and Office operating systems.And a computer program called "intelligence officer" can record all operations on the computer, including passwords.It never shows up, and computer users simply don't know it.
"Millipede" intelligence agents "Millipede" intelligence agents are actually a type of cyber "hacker".It once invaded India's nuclear industry sector, and stole many core secrets from the computer network of the US military's "NATO Air Defense Command Center", including core secrets such as data and information on all nuclear warheads pointed to by the United States against Russia.In future cyber warfare, "millipede" intelligence personnel will take on dual tasks at the same time, that is, after purposefully stealing important military secrets, they will use "logic bombs" that can devour computer data frantically, causing large-scale network congestion, and Through network transmission, the "magnetic explosion bomb" that paralyzes the network system in a short period of time is used as a means to completely disable the enemy's command and control system.
"Robot" spies are an inevitable consequence of the development of nanotechnology.Such as "spy grass", "spy mosquito", "intelligence officer fly", "spy ant soldier", "miniature reconnaissance device" and so on.It is a "miniature attack robot" capable of destroying the enemy's network system and collecting intelligence information. It is the size of a coin.At present, Swedish researchers have successfully developed the world's smallest robot.
Because its length is less than 1 millimeter, it is called a "robot bug". It has 8 legs and can move at a speed of 1 centimeter per second or fly at a speed of 100 centimeters per second.It could end up being one of the cyber intelligence operatives.An ultra-miniature camera is installed on its top, and the controller can allow it to go deep into the enemy's rear for intelligence personnel activities, or let it directly enter the enemy's command and control center, collect enemy intelligence, and attack and destroy the enemy according to instructions The network system makes the enemy lose the ability to control its own troops in real time.
In addition, there are "hybrid" intelligence personnel under consideration, etc., which are all ways to successfully obtain information.
From the comparison of cyber intelligence personnel and traditional intelligence personnel, we can find that they have distinct characteristics: cyber intelligence personnel are well concealed and difficult to expose.The use of computer networks to steal intelligence leaves almost no trace and usually does not cause damage to the target computer network, so it is difficult to detect and distinguish.
Network intelligence personnel have high work efficiency and great threats. Once computer network intelligence personnel invade important computer systems, especially access privileges, intelligence personnel can use this as a base to continuously obtain a large amount of highly confidential information, and victims The latter is often unaware of the loss he has suffered.In theory, cyber intelligence officers could try to break into an enemy computer network from anywhere in the world where there is a computer network.In this way, computer network intelligence personnel can steal the other party's confidential information while sitting in a clean laboratory in the country without worrying about their own safety.Cyber intelligence personnel can steal the other party's core secrets while enjoying coffee thousands of kilometers away, and start a war quietly.
This kind of network intelligence personnel who has neither gunpowder smoke nor noise will also make people turn pale.Although cyber intelligence personnel cannot use pistols or poison to kill opponents like ordinary intelligence personnel, they can take away or destroy years of accumulation on which the opponent relies for survival and development in an instant.Paralyze your opponent's website.
In the future, perhaps no kind of disaster can be more terrible than the paralysis of the network.Intelligence personnel are the product of war, and their own value is directly proportional to the intensity of the war.Cyber intelligence officers are a brand new field.In cyber intelligence personnel warfare, knowledge and technology are the fundamental factors that determine the outcome of a war.The future society is a network society, and it will still develop amid fierce competition, and network intelligence personnel will always be a terrifying force that all parties need to seriously study and deal with in the future competition.
§§§Session [-] "Super Intelligence Officer" Melee in Space
With the development of science and technology, intelligence personnel satellites have entered people's sight. It has advantages that traditional intelligence personnel methods cannot match. Intelligence personnel satellites fly around the earth at an altitude of more than hundreds of kilometers, and the area covered by a single photo of it is It is worth hundreds of aerial photos, and the amount of information contained in it is conceivable.
Intelligence personnel satellites can not only conduct large-scale coverage surveys on the earth's surface, but also conduct repeated detailed investigations on specific targets, and are not interfered by various factors such as the atmosphere, so they can take extremely high-definition photos. Infrared sensors on satellites can strip off any camouflage on missile launch sites, and even detect stoves, electric clocks, and radios that emit heat in military facilities.Therefore, intelligence personnel satellites have been loved by intelligence agencies of various countries for quite a long time.
On October 1957, 10, the former Soviet Union launched the world's first artificial earth satellite, Sputnik 4, into space with a carrier rocket.The United States followed closely by sending the "Pioneer" satellite into orbit around the earth in March 1. This satellite is still operating normally in space today.After these two satellites were put into space, all countries are scrambling to set foot in outer space.U.S. Senator Lyndon Johnson once publicly commented on this: "Whoever gains the final status of controlling space has gained control of the earth, whether it is for the purpose of dictatorship or the preservation of liberty. "This sentence reveals the essence of space competition.
With the launch of the artificial satellite, it was soon used in the field of international intelligence personnel and became the most modern stealing tool.Satellites used for intelligence personnel activities are called intelligence personnel satellites or reconnaissance satellites.
On February 1959, 2, at Vandenberg Air Force Base in California, the United States, the first intelligence satellite "Discovery 28" in human history soared into the clouds. In October 1, "Discovery 1960" carried another intelligence personnel satellite "Samos" into the blue sky. The "Samos" intelligence personnel satellite can carry out a large number of audio and video recordings during space operations. The information collected in one year is dozens of times more.
The former Soviet Union was not to be outdone. In 1962, the former Soviet Union launched the "Cosmos" intelligence personnel satellite into space to conduct high-altitude intelligence personnel reconnaissance on the United States and Canada.By the end of 1982, the United States and the former Soviet Union had launched 373 and 796 satellites for full-time intelligence personnel respectively, with a total of 1169 satellites.These more than 1000 "super intelligence personnel" monitor every corner of the earth day and night at an altitude of several hundred kilometers.
According to the statistics of relevant experts, 70% to 80% of the artificial satellites launched by various countries are intelligence personnel satellites.The former Soviet Union's "Cosmos 596" intelligence personnel satellite shined brilliantly in the Fourth Middle East War. On October 1973, 10, Egypt and Syria launched the fourth Middle East war, and Israel was almost wiped out. One of the reasons was that before the war, the former Soviet Union launched a "Cosmos 6" intelligence personnel satellite, whose location It is in the sky above the area that may become a battlefield.The former Soviet Union used this intelligence personnel satellite to steal Israel's secrets for Egypt and send intelligence to Egypt in time.Under the "care" of intelligence personnel satellites like eyes, Israel's failure is almost a foregone conclusion. During the Falklands War between Britain and Argentina in 596, the former Soviet Union and the United States frequently launched intelligence personnel satellites to closely monitor the battle situation in the South Atlantic Ocean, and provided Britain and Argentina with satellite photos of the enemy's military situation.During the war, the former Soviet Union successively launched the "Cosmos-1982" and "Cosmos-1365" marine surveillance satellites to detect the military battle between Britain, Britain and Argentina, and immediately reported the relevant information obtained by the British army. Provided to the Argentine army, so that the Argentine Air Force sank the famous "Sheffield" destroyer in the British task force in one fell swoop.It can be seen that the role of intelligence personnel satellites in warfare can be seen in general.
The frightening and amazing thing about satellites for intelligence personnel is that they are more detailed, more high-tech, and more sensitive.The photos taken by the high-altitude camera of the intelligence personnel's satellite can be enlarged to identify the license plate number on the ground car; the infrared sensing equipment on the intelligence personnel's satellite can photograph various military facilities on the ground after being camouflaged. There is no bunker in the eyes of the satellite; the electronic signal interception equipment on the satellite of the intelligence personnel can intercept the radio communication signals of various countries and the telemetry and remote control signals of space vehicles.
Intelligence personnel satellites have brought about a fundamental and great revolution in the means of intelligence work.The intelligence personnel agencies of some countries also secretly communicate with the intelligence personnel lurking in other countries through the intelligence personnel satellites, and direct the intelligence personnel to carry out secret activities, and the intelligence personnel lurking in other countries can also use the radio system on the intelligence personnel satellites , to directly ask for instructions or transmit information to its superior commanding authority.In this way, not only the time for information transmission is shortened, but also the risk of being intercepted by the country's counterintelligence personnel during the information transmission process is reduced.
§§§Section [-] Intelligence Agents Hiding in the Air
In the field of intelligence personnel's activities, "participation" in the communication of the enemy plays an important role.Because for the keepers of secrets, no matter how mysterious the research and development process of a certain technology or the decision-making process of a certain strategy is, and how tight-lipped the insiders who know the secrets are, it is meaningless to "seal" the secrets. The value of a secret is that it can be done without the knowledge of others.
However, contradictions arise here. The implementation of secrets is inseparable from extensive communication among insiders. The process of communication is a process of communication, and certain media of communication are indispensable in this process.And this medium of communication has become the main focus of intelligence personnel's espionage. No wonder someone said humorously: "It's better to hide in the air when he speaks than to pry open his mouth." "The intelligence officer is a typical communications intelligence officer.
It is no exaggeration to say that the US CIA can be well-deserved as the spokesperson of the image of communications intelligence personnel, and this image is established by communication "bugs" of various shapes, a considerable part of which is aimed at China.Among the tools of these communications and intelligence personnel, the simple ones are just fake twigs made of fiberglass, which were once used to collect important intelligence from the Chinese embassy in the United States, and the complex ones are like a $[-] million intelligence personnel satellite.Using these comprehensive communications intelligence personnel tools, the CIA has established a comprehensive communications intelligence personnel network in China.
(End of this chapter)
You'll Also Like
-
I, a mercenary, became a beautiful silver-haired boy
Chapter 1600 22 hours ago -
There are too many villains, so it's reasonable for the heroine to fall for him!
Chapter 164 22 hours ago -
Became a delicate girl, and was made to cry by the childhood sweetheart
Chapter 123 22 hours ago -
My girlfriend thinks I'm crazy, I'm picking up gold in the end times
Chapter 338 22 hours ago -
Young White Horse: The Drunken Swordsman shocked Little Dongjun at the beginning
Chapter 182 22 hours ago -
Pirates: I am a great swordsman
Chapter 551 22 hours ago -
One Piece: My Conqueror's Haki can be trained automatically
Chapter 290 22 hours ago -
Special Forces: If I ask you to scout, you will overturn the wolf's teeth?
Chapter 352 22 hours ago -
Weird asylum, you're taking in a human being like me?
Chapter 1038 1 days ago -
Fishing Druid in Another World
Chapter 480 1 days ago