Chapter 124 The Devil’s Tracking Technique
To put it simply, the advent of Internet technology quickly attracted widespread attention from various countries, including many intelligence agencies that rely on information for a living. While others are still praising its magic and convenience, MI6 is worried that this technology is not in the hands of Britain, which will lead to huge loopholes in their intelligence competition.
At the beginning of the document, the project founder even compared this technical disadvantage to the Japanese cipher machines leaked during World War II. They believe that given time, the Internet will completely replace mail, telegraph and wired telephone communications. Even if it is invented by an ally, there is no guarantee that the other party will not steal secrets.
So the Sunflower Project was proposed.
MI6 intends to cultivate a group of people with completely different identities in reality. These people are different from those who join halfway and are different from regular employees: when MI6 does not activate them, they are no different from ordinary people and will spend their lives normally. life. Unless under special circumstances, the intelligence agencies will not take the initiative to recruit them, because this may lead to their identities being exposed. Only when these people feel they must contact MI6 will they instantly transform from an ordinary person into an espionage worker.
According to the plan, they will be the pure white lurkers of the information age.
Diad Flynn was one of the first proposers.
So the question is, since these people have nothing to do with intelligence agencies since they were young, how can they become the hidden force of MI6 and even guarantee their loyalty to it?
Sunflower's solution is also very simple, that is, distributed training in family units, so the founders did not recruit personnel from orphans like their peers, but chose industry insiders-veteran veterans and high-level volunteers within intelligence agencies. Their children are also divided into two categories, corresponding to grassroots intelligence and upper-level intelligence. The first category has about 2,600 people, and the rest are in the second category.
Seeing this, Chaoyang couldn't help but admire the brains of these people. The veterans and spies could train the children themselves and instill loyalty education. There really was no need for MI6 to get involved. The growth path of these children will be the same as that of ordinary people...study, graduate, work, and get married. The only difference is that they have mastered all the knowledge to become an intelligence worker in their spare time, and they all know that they have a mission.
Their parents lived in an era before the Internet was popularized, and they might not be entered into the system until long after they changed jobs. If they did not publicize it themselves, few people would know that an old carpenter or farmer in the town had been a veteran before.
As for why there are two types of people, it also makes sense.
Because it is difficult for people at the bottom to get into the upper class circles, they naturally cannot have access to high-level intelligence. What's more, intelligence officers can't work blindfolded. They have to know what kind of information the agency needs. This means that MI6 has to regurgitate some of their secrets. The advantage of classification is this, so that a grassroots worker will not know the most top-secret information. intelligence.
George Flynn obviously joined as his father's successor. Judging from his age, he was already in his thirties when the plan was implemented, so he could not be a pure white lurker. In addition, as a senior executive of MI6, he retired very early, as if he had been fired early.
Chaoyang arranged the ages of the three people in order and found that Taylor's age basically coincided with the time when George Flynn retired.
If Taylor is the seed of the Sunflower Project, it makes sense that he wouldn't be on the roster.
This is also the reason why Chaoyang has never been able to find the other party's flaws in online information.
To confirm this, he hacked into the British Central Bureau of Statistics server and retrieved the registered identities of the Taylor family. The data here is public information and is highly tied to the identity document. Unfortunately, the information about his father only has one name: Edmerk Taylor, who is a factory operator and has no photo information.
This actually aroused Chaoyang's fighting spirit.
He found the elementary school and middle school where Taylor attended, went back in time to the target's childhood, and began to tirelessly search through the vast amounts of dusty information.
Those were yellowed color photos.
Messy and incomplete.
In 1990, schools did not have any electronic archives, and mobile phones and the Internet were not widely available among students. The information he was looking for basically came from the blurry photos of the children who were accidentally found when they were students when they grew up. To commemorate them, he scanned them into personal space or social networking sites so that they could be searched by Chaoyang.
This search took most of the day.
Until early in the morning, Chaoyang's eyes finally stopped at an almost yellow-white photo.
It was a celebration after an elementary school football game, and one of the teams was also in Taylor's class. The children ran towards their parents. Because the shutter was pressed while in motion, the photo was a little out of focus and looked slightly blurry. Chaoyang didn't see Taylor's front, but he saw a familiar man. This man was wearing a suit and stood up straight, like an old gentleman waiting for his child to embrace him.
Even without the need for comparison software, he could still recognize that this person was George Flynn.
…
As usual, Kelce opened the base's fourth-level security door and conducted daily inspections of the machines in the room.
This is the core area of the Wuxor Cross Building. It is impossible for outsiders to enter here, so what inspectors need to guard against most are rats. This is no joke. There are far more records of rats damaging wiring than people. However, since infrared rodent repellent devices are installed in the ventilation ducts of the building, the significance of this work has become minimal.
Of course, the inspection also includes whether the wiring is loose, whether the machine temperature is normal, whether there are any abnormalities in the monitoring and air conditioning, etc. But Kelce doubts there will be any problems with these machines until he retires or is laid off.
After all, they are much more durable than humans.
The time is now 7 pm, and the shift is approaching. This was his last job before leaving get off work, so he checked a little carelessly. After walking around and finding no abnormalities, he planned to sign his name on the inspection list.
At this moment, Kelce suddenly noticed a green light flashing on a data collection machine next to the wall.
what happened?
He recalled that the alien device was used to check the number of accesses to a confidential database. Every time an agent needs to view top-secret information, he needs to apply to his superiors. The specific number of times the agent has viewed it will be recorded by the collection machine for verification purposes. In order to prevent fraud, the device is not connected to the host itself, and what it monitors is the electronic data flowing through the hard drive port.
Compared with the computer in the computer room, it is more like a paper tape punching machine, which is both ancient and backward. Each time a query access is detected, its indicator increases by a number and cannot be externally cleared or adjusted.
The green light flashes to prove that electrons have passed.
But now there wasn't even an agent in the room.
Kelce rubbed his eyes, thinking he had seen it wrong.
He waited a few seconds, then saw the machine flash green again.
Someone is accessing the most secure host in the building? What a joke! These machines are physically isolated. Only by bringing special equipment to this room can you connect to the host database!
Obviously, the collection device is broken.
Kelce turned on his radio and called his colleagues in the office, "Hey, Ike, help me check the number of times the collector has returned."
But the other party didn't reply, and there was only a buzzing electromagnetic noise in the receiver.
"Damn it, there's no signal." He cursed and decided to do it himself.
This device is covered with an EMP shielding shell. You need to manually open the unlocking buckle to lift the shell and see the indicator reading inside. This operation is not troublesome and can be completed in ten seconds. He plans to write down the numbers first and then go out to check with past records.
However, it was this sight that made Kelce's back instantly wet with sweat!
Although he couldn't remember the specific number, the last record was a four-digit number beginning with six, and the leading number "6" had not changed for a long time.
At this moment, the reading he saw was 12316.
Four digits turned into five digits!