The FBI teaches you lie detection, people reading and intelligence skills

Chapter 67 High-Tech: Unexpectedly Obtained Information

Chapter 67 High-Tech: Unexpectedly Obtained Information (2)
eavesdropping on Chinese submarine cables Many trans-Pacific cables pass through an undersea location near Guam or a U.S. military base in Hawaii, and most trans-Pacific cables start or end in the United States, even if the cables do not pass through a US or UK-US spy There is also a way to intercept the signal transmission of the areas under the control of the member states of the agreement.According to reports, during the Cold War, the United States sent specially-made submarines equipped with special equipment to sneak into Chinese ports and install "tapping devices" from the US National Security Agency on submarine cables.Communications sent from China or from abroad to China, that is, communications whose sending and receiving ends are both in mainland China, are also vulnerable to eavesdropping.The United States could also use another Pacific Rim site, Misawa Air Force Base in northern Japan, to eavesdrop if those communications were carried by satellites launched by the Chinese government itself.

Use intelligence personnel satellites to monitor "Orion".This is the latest in a series of US intelligence personnel satellites that are used to intercept point-to-point wireless signal microwave communications used by many local and long-distance telephones around the world.Through this means, the United States can wiretap telephones deep in the Chinese mainland. "Orion" was originally designed to intercept the communications of important command and control systems within the former Soviet Union.The NSA later learned that wireless phones emit signals that can be intercepted.Thus, using satellites over the North Pole, the United States can eavesdrop on cell phone calls in China and other countries.The most well-known in this regard is the "echelon system".The system is a monitoring network used by the US National Security Agency, with monitoring points in the United States, Canada, Australia, New Zealand and the United Kingdom. London and Washington agreed to set up the network in 1948. The power of the "echelon system" is astonishing.It uses the United States' satellite network to pick up microwave signals from mobile phone communications.At the same time, millions of phone conversations are recorded, and powerful search equipment is used to look for words that may pose a security threat.The spy satellites revolutionized American intelligence gathering during the Cold War, and they remain an important source of intelligence to this day.Even for commercial satellites, the image definition and resolution capability of the ground can reach one meter, which is enough to monitor the movement of armored vehicles and most military equipment on the ground.

Computer eavesdropping The United States also uses new technologies to conduct computer eavesdropping on China.The most advanced eavesdropping technology can place an eavesdropper on the computer keyboard, so that the key codes pressed by the user can be monitored, because each key will make a different sound, as long as these sounds are converted into letters, you can know User's file content.

Eavesdropping on China is only one part of the strategy of U.S. communications intelligence personnel around the world.While strengthening regional communications intelligence personnel, the United States is also actively deploying a global network of communications intelligence personnel, which constitutes the core of the network of communications intelligence personnel.In the northern part of England, England, on Menwith Hill in Harrogate, Yorkshire, the terrain is relatively high, and the visibility is excellent. Looking up at the sky and looking down at the ground, you can see for miles at a glance.People can see from a long distance that there are more than 30 huge white golf ball-shaped things standing on the mountain. People who see it for the first time may think it is an observatory.However, Menwith Mountain is actually a place that ordinary people can't reach. It is a military base of the United States.The golf ball-shaped thing is the radome, and a dish antenna is hidden in each "golf ball", and they are all aimed at the satellites in the sky.

In this building covering several acres, the world's most advanced computer system and satellite signal receiving equipment are installed, with the world's most advanced eavesdropping capability.It can eavesdrop on the signals of many artificial satellites flying above the earth.This is an important part of the Western global intelligence personnel network. Its main task is to monitor overseas communications and decipher codes. citizen.

For decades, Menwith Hill has been in touch with a worldwide wiretapping network controlled by the "ultra-secret" NSA in the United States.The NSA-controlled network is also linked to U.S. listening posts around the world, such as GCHQ in Britain.Menwith Hill was GCHQ's largest listening station.During the Cold War, the listening post was mainly responsible for monitoring the diplomatic, military and commercial communication systems of socialist countries behind the so-called "Iron Curtain".However, after the end of the Cold War and the fall of the Berlin Wall, the listening station not only did not shrink, but expanded further.

Stealing espionage from the communication link is hardly a way of stealing secrets with the least investment, because a large number of technical intelligence personnel tools need to be used in the process, but the results are often remarkable. CIA officials once claimed that Feel the coastline of China like the "back garden" of your own home.These high-altitude agents dominate modern espionage warfare.

At the same time, what complements the tools of communications intelligence personnel is the meticulous transportation network of intelligence personnel, which is like a series of hidden highways, so that the obtained intelligence can be conveyed in place in a timely and effective manner. Known as the "first facility" for intelligence personnel activities.

In the field of intelligence personnel activities, transportation is the link between intelligence personnel and special agents for the transmission and operation of intelligence. Here, transportation includes not only the means of transportation in the traditional sense, but also other wired and wireless equipment for transmitting intelligence, and even The intelligence officer himself.

When it comes to "secret agents", I believe that most people are familiar with it. In fact, this is a typical example of using intelligence personnel as a means of transportation, which is reflected in many film and television dramas.In the movie, the two spies meet, of course, looking around, sneaking and wretched.

This mode of transportation, which is used by intelligence personnel personally as a means of transportation, shows obvious concealment, uncertainty and safety, but objectively requires the geographical proximity between intelligence personnel, which obviously cannot meet the needs of intelligence agencies. The need for efficiency is at odds with the prosperity of modern communication tools.

At the same time, this kind of work of personally carrying information to complete transportation tasks is full of dangers. In order to ensure the safety of information and avoid information leakage, intelligence personnel try to use some ingenious ways to record information. Data is written in starch solution (such as rice soup), and after the intelligence agency receives the letter, it is washed with iodine to make the above text appear; It will be automatically destroyed at any time to prevent the information from being understood by the enemy. Some intelligence agencies will put the information in a special iron box. Once the iron box is stolen, the intelligence agency will carry out wireless remote control, and the automatic destruction device in the iron box will The green solution was sprayed out, completely corroding the letter containing the information.

When modern science and technology and means of transportation are widely used in military affairs and daily life, the transportation network of intelligence personnel becomes much richer. Therefore, the argument that "science and technology are primary productive forces" is particularly applicable here because of the Marconi's radio transmitter has "never-fading radio waves", and it is because of geosynchronous satellites that there is an "intelligence system transmitted in space". Of course, the most typical means of transportation for intelligence personnel is electronic Computers and Internet.

Many people think that the transmission of information on the Internet is a matter of course, and intelligence personnel are nothing more than using the Internet platform to send out information.Those who hold this point of view ignore the confidentiality and significance of espionage, and what the Internet, as a tool for intelligence officers, really needs to do is to prevent theft of network resources and ensure the safe arrival of messages.

For this reason, many intelligence agencies have set up some secret websites, and information can only be transmitted through the links of these websites. Some agencies have specially made some computer software, and only computers with such software can realize "dialogue"... …these are useful explorations in keeping espionage safe.

However, what cannot be ignored is that computer hackers and computer viruses running on the Internet, mixed with unpredictable intelligence personnel software, are attacking these seemingly impenetrable intelligence personnel transportation support facilities unscrupulously, and there will inevitably be loopholes, and even more intelligence personnel organizations are studying The technology of synthesizing its data into espionage by looking for optical fibers for intelligence transmission, these potential threats have determined that it is difficult to rely solely on network transmission as a safe and ideal means of espionage transportation.

Along with the construction of a three-dimensional information transmission system, some scientists have put forward a rather creative idea: divide the spy information into different data elements, and then use satellites, the Internet, traditional means of transportation, manpower and other tools for transmission, and finally in the The receiving party's intelligence agency synthesized these pieces of data to restore the original intelligence.The US National Survey and Mapping Service is currently leading a program that will revolutionize the delivery of intelligence in the United States by taking full advantage of information technology in the commercial market.

The program focuses on exploring technologies for combining reconnaissance satellites with intelligence gathered through other means, such as commercial mapping data, aircraft reconnaissance and electronic surveillance, so that highly integrated intelligence products can be more rapidly utilized.In addition, the US National Mapping Service provides millions of geographic maps for ground, navigation and aviation, and plans to make all geographic maps digital.In addition to the analysis and rapid transmission of intelligence, the system of "collection, processing, analysis and transmission" of intelligence requires "geospace positioning".

This means that each image must be time-referenced and feature the Earth and artificially added [-]D features to within a few feet of the entire Earth.Although this is beneficial to the security of intelligence transmission, it also objectively increases the pressure and difficulty for intelligence personnel as the source of intelligence transmission. For now, it will take time for a large number of applications of this transmission method.

It is not difficult to see that the vehicles for intelligence personnel are vehicles for information transmission in the final analysis, and the pursuit of fast, safe and efficient is the constant theme of vehicles for intelligence personnel.The various "networks" connecting the means of transportation reflect the distribution of the intelligence personnel organization network. From this point of view, the setting of the intelligence personnel transportation network fundamentally reflects the thinking habits and working thinking of the intelligence agencies. It is required that intelligence agencies not only strive for excellence in technology and tools, but also work hard on their minds and ideas.

§§§ Section [-] Gene Spy Emerges
(End of this chapter)

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like