Chapter 228, Core Database
In the CIA's general control room, Joey and Smith stood together, and in the surveillance screen, they saw the scene that had just happened, Joey's face was excited, and Smith was frowning.
"Why is there only this Chinese soldier?" Smith touched his chin and expressed his doubts.
After the CIA's number one sniper was sniped, Smith told Joey to get ready, the two people in Cuba were likely to invade their CIA, and Joey didn't believe it at the time, according to his guess, this person would assassinate himself, and he would definitely not go directly to the CIA, after all, it was heavily guarded.
This time, the Japanese intelligence delegation entered the CIA, not because they deliberately arranged it, but because of the National Security Council's established project, Smith felt that if the two of them were going to invade the CIA, disguised as a Japanese delegation to enter here, it would be the best way, so they did a good job of thorough protection.
But they never expected that the entire Japanese delegation was instigated by that China to start a fierce battle in the CIA, which led to the destruction of the entire Japanese intelligence delegation within the CIA.
What Smith is worried about now is not how to explain this matter to the Japanese after the collapse of the Japanese expedition, on the contrary, he does not need to worry about this matter at all, as long as he transmits a copy of the surveillance video to the Japanese Foreign Intelligence Agency, and they don't even need to explain anything to the Japanese, because there is no need, the Japanese can only eat Coptis chinensis dumbly, and they know their own suffering, and they don't even dare to negotiate with them with any dissatisfaction, because the Japanese should be worried that they will be bitten back by the CIA.
"Maybe he was mixed in with the expedition and was killed." Joey guessed.
"It's better to be like this." Smith nodded, but the worry on his face didn't disappear at all, "If it weren't for that, then this person would be terrible." ”
"There can't be such a powerful person in the world, unless he is not human." Joey quipped with a laugh.
And at this moment, the employee next to him suddenly came over and said, "Sir, Miss Natasha from the Reconnaissance Bureau has come in with someone and is now rushing to the core database." ”
"What?" Joey's face changed drastically, "No one can enter the core database without the order of the director and the president, how can you let her in." ”
"She has documents signed by the president, and she has permission from the director, and what happens to us here, she has full authority to deal with it." The employee shrugged his shoulders and said helplessly.
"Joey, you're in charge of the aftermath." Smith's face was cold, "Determine if the other person is in the body, once confirmed, report it to me immediately, I'll go to the database." ”
"Yes." Joey nodded, watched Smith leave, and when he thought of Natasha's woman, his face became gloomy again, and he thought to himself, "What is this woman doing here, and she still has the president's secret order?" ”
Puzzled, Joey quickly commanded the internal guard troops to confirm the bodies, but soon he got a message: "Except for the Chinese, there are only thirteen corpses in total." ”
"What?" Joey's face changed drastically, "There are a total of fifteen people in the entire Japanese expedition, and fourteen died, how can there be only thirteen corpses?" ”
"Sir, in fact, we only killed thirteen Japanese agents, arrested one Chinese, and one is missing." The captain of the internal guard reported.
"Damn it!" Joey suddenly understood why Natasha had come to the CIA, and the president's order, that they had missed someone, and that person was likely breaking into the CIA's core database, "Someone had hacked into our security system. ”
Americans are far more reliant on technology than any other country in the world, and the intelligence industry is no exception, and the CIA's core database is home to the world's most secretive database.
The CIA's database is divided into two layers, inside and outside, and at the bottom of the underground facility, there are various high-tech protective facilities, as well as artificial protection, and when the snow leopard instigated those Japanese to have "intimate communication" with CIA agents, the dragon had already entered the first layer.
This is the world's largest mobile database, through which information sent by CIA agents from all over the world is automatically saved.
The hackers also hacked this database, and its main source of information was not the kind of CIA agents, but from some commercial companies in the United States, such as Google.
Google, as the world's largest search engine, searches billions of dollars a day, and the CIA's database is connected to Google, of course, Google must not have the right to contribute their database to the CIA, and they do not get any benefits, but they cannot view the CIA's database.
Therefore, almost anyone in the world who uses Google's search engine will be locked by the CIA as long as they search for some sensitive words, and analyze it to finally determine the purpose of the person using the search engine and whether it constitutes an infringement of the national interests of the United States.
Many years ago, there was a big or small event in China, when Google withdrew from China and the Chinese government imposed sanctions on Google.
Ordinary people only know that Google's withdrawal from China is a unilateral act of the Chinese government to protect local companies, but in fact, Google was forcibly expelled from the Chinese market because it violated China's national security.
In fact, the core database of any American company is linked to the CIA, but not as obvious as Google.
The United States is a ** country, and the protection of citizens' privacy is extremely strict, but ordinary people can never imagine that even if they use search engines, they are under the surveillance of the CIA and major spy agencies in the United States.
The world's number one country, there is a natural invasion of human privacy bill, called the Patriot Act, the content of the bill is very simple, "in order to counter terrorism" the police "have the right to view any citizen's email communications, and even spy on citizens' daily communications without permission." ”
Therefore, the self-proclaimed ** and privacy of American citizens are actually not privacy at all in the eyes of their rights institutions, and they are almost public toilets that they can enter if they want to.
Of course, this situation is no exception in any country in the world, but some countries are not very obvious, and some countries are just doing it obviously, and Americans have been immersed in the business of peeping into the privacy of their citizens for a long time, and almost no country can surpass it.
This first database is a mobile database, so it is not difficult for the world's top hackers to get in, but it is difficult to get useful information from this massive database.
The CIA has had many successful hacks, but all hackers can get in is actually this mobile database outside.
The real secrets of the Americans are hidden in the second layer of the database, which contains all kinds of secrets of various countries in the world from ancient times to the present, and even the Americans themselves cannot crack them, so they exist inside.
Entering the first layer of the database, people will be surprised to find that almost all the answers to many unsolved mysteries in the world are in it, and the things hidden in the second layer of the database are some secrets that ordinary people dare not think of, so that taking a look at it in their hands will subvert an ordinary person's values of the world.
Canglong doesn't have any nostalgia, because if the first-tier database is to be downloaded, it is estimated that ten years is not enough, and the most important thing is that these intelligence data that are treasured in the eyes of all countries in the world are garbage in Canglong's eyes, because he knows most of the contents, and even if he doesn't know, it is not of much use to him.
And the second layer of database protection passwords, in fact, is also very simple, this is not like a Hollywood blockbuster that requires all kinds of high-tech verification to get in, breaking into the first layer, basically there is no high-tech.
To enter the second layer, only a simple password is required, of course, this simple password, in fact, is not simple, because this password, only every US president knows, even the director of the CIA can not easily open the second layer of the database, because he has no authority.
When many U.S. presidents were in office, they hung up before they had time to open this database, and some presidents even did not have the authority to open this database.
And the person who created this database was none other than an American politician, Benjamin Franklin.
If you don't know who Benjamin Franklin is, it's very simple, get a hundred dollar bill, and the fat baby fat face on it is the famous Benjamin Franklin.
A figure who is not the president of the United States, but who is alongside the founding president of the United States, Washington, is the intelligence officer of Washington in the American Revolutionary War, the equivalent of the current director of the CIA.
At that time, the United States was not yet independent, let alone the so-called CIA, but Benjamin Franklin was one of the drafters and signatories of the American Declaration of Independence.
How can this fat man have such prestige? His major role in American history was not only to assist Washington in building the United States, but also because he established a unique intelligence system.
Since Benjamin Franklin, the fat man, the intelligence system of the Americans has become more and more perfect, and this second-tier database was also established by him, until later tossing and turning, the Americans got more and more secrets, many of which were sealed in this database.
After the CIA was established and its headquarters moved to Langley, Virginia, this secret database of American history was relocated here and connected to the original CIA database.
The reason why the password of this database is very simple is because everyone has the opportunity to decipher his password, because the password board of this database is placed in the courtyard of the CIA headquarters