Haggai Harmon - The Chameleon Conspiracy
Здесь есть возможность читать онлайн «Haggai Harmon - The Chameleon Conspiracy» весь текст электронной книги совершенно бесплатно (целиком полную версию без сокращений). В некоторых случаях можно слушать аудио, скачать через торрент в формате fb2 и присутствует краткое содержание. Жанр: Триллер, на английском языке. Описание произведения, (предисловие) а так же отзывы посетителей доступны на портале библиотеки ЛибКат.
- Название:The Chameleon Conspiracy
- Автор:
- Жанр:
- Год:неизвестен
- ISBN:нет данных
- Рейтинг книги:5 / 5. Голосов: 1
-
Избранное:Добавить в избранное
- Отзывы:
-
Ваша оценка:
- 100
- 1
- 2
- 3
- 4
- 5
The Chameleon Conspiracy: краткое содержание, описание и аннотация
Предлагаем к чтению аннотацию, описание, краткое содержание или предисловие (зависит от того, что написал сам автор книги «The Chameleon Conspiracy»). Если вы не нашли необходимую информацию о книге — напишите в комментариях, мы постараемся отыскать её.
The Chameleon Conspiracy — читать онлайн бесплатно полную книгу (весь текст) целиком
Ниже представлен текст книги, разбитый по страницам. Система сохранения места последней прочитанной страницы, позволяет с удобством читать онлайн бесплатно книгу «The Chameleon Conspiracy», без необходимости каждый раз заново искать на чём Вы остановились. Поставьте закладку, и сможете в любой момент перейти на страницу, на которой закончили чтение.
Интервал:
Закладка:
“How much does that all add up to?” I asked.
He shrugged. “We estimate it at five billion telephone calls, e-mail messages, faxes, and broadcasts daily.”
“Any communication?” I asked with concern, thinking about some private conversations I’d held with several women I’d dated.
He smiled. “Not to worry.” He must have heard that anxious question many times.
“How do you do it?”
“Echelon collects data through a variety of methods, including through radio antennae at listening stations located in key areas around the world. We scan the enormous amount of data through filtering software using a computer network hosted by the UK’s GCHQ, Canada’s CSE, Australia’s DSD, and New Zealand’s GCSB.” The torrent of acronyms could make you dizzy. Only insiders knew and cared that they stood for Communications Security Establishment, the Defense Signals Directorate, and the Government Communications Security Bureau. We needed little explication.
“The filtering software flags messages containing any of a set of key words, such as bomb or nuclear,” Feldman continued.
“How does the actual process of data sifting work?” asked Nicole.
“We’ve got word-pattern recognition technologies, plus advanced technology in speech recognition and optical character recognition. See, the computers convert sound gleaned from intercepted telephone conversations and text images from fax transmissions, and store them in a searchable database.”
“What about foreign languages?”
“Translation software recognizes many languages and can translate them into English. Once text is stored in the database, our analysts engage data-mining software that searches data to identify relationships based on similarities and patterns.”
“What about help in our operation, including getting access to enemy computers?”
“We’ve developed new tools to assist in covert-surveillance operations. One example is Tempest, a surveillance technology that captures data displayed on computer monitors by collecting electromagnetic emissions from the internal electron beams that create the images.” Had he avoided answering my question on computer hacking?
“So much has changed since I last had contact with the NSA,” said Nicole.
He smiled. “We’ve additional developments: Fluent and Oasis. Fluent does computer searches of documents written in various languages. Our analysts put in queries in English, just as if they were using any Internet search engine. Those results that come up in any foreign languages are translated.” He paused. “Oasis picks up audio from television and radio broadcasts, and keeps them as text. The software is very sophisticated. It can identify the gender of the speaker, and if that audio has already been previously captured, our analysts can obtain a digital transcript of the data and compare. Oasis is limited to English, but the CIA is adapting it to understand additional languages.”
“What about recordings from the past?” That’s what I wanted to know.
“We occasionally have that, if what you’re looking for was already captured for other purposes,” he answered.
“It all sounds like omnipotence,” I said.
“Hell no, far from it,” he said. “Sure, we’re the largest intelligence service in the world. We employ more mathematicians than anyone else, and we’ve got the strongest team of code makers and code breakers ever assembled. But the volume of information generated every day exceeds the capacity of our technologies to process it. Not to mention the encryption technologies that can give you a look at what turns out to be gibberish, without any possibility of breaking the code. We know, for example, that Osama bin Laden and other terrorists are using steganography: hiding data within a benign-looking file, such as a picture of a sunset in the South Pacific. Can you imagine the computing power necessary to detect it? And I’m not even talking about breaking it, which is even more complex.
“But why go that far? Even simple tricks can slow us down, and sometimes even derail us. That happens when messages are ciphered in a simple method that substitutes letters for other letters. Let’s go to an even lower level of sophistication, to elementary school games, and create messages that substitute the word football for bomb and baseball for American president. Do you set the software to alert us each time it recognizes these words? We would drown under the sheer volume.”
“I see,” said Nicole.
“So you see why there’s no assurance that any of these systems will be fail-safe and provide the kind of intelligence that you want.”
I nodded. “I get it. Knowing those caveats, all I need to do is provide you with key words?”
“It’s not that simple, but essentially, yes. Once a key word included in the Echelon dictionary is captured, it flags the entire message. After decryption, our analysts forward the data to the client intelligence agency that requested the intercept of the key word. We pass the signals through SILKWORTH, our supercomputer system where voice recognition, optical character recognition, and other analytical tools dissect the prey. Although five billion messages pass through the system every day, we actually transcribe and record only very few text messages and phone calls. Only those messages that produce keyword ‘hits’ are tagged for future analysis.”
“Can I give you the key words now?”
“No. We must first start an IDP, an intercept deployment plan. I’ll also need your agency’s formal request. I was asked to give you only a presentation. But tell me more about the case.”
I ran quickly by him the leads we had. The run was long, but the list of solid leads disturbingly short. We had a dozen aliases that the Chameleon had used.
“We don’t know for sure if it’s one person, or eleven, or twelve. So far Ward has been my prime target. He could be in the U.S., Australia…or back in Iran, although I’d be surprised if he were there.”
“Why?
“I hardly think he could adapt or would want to adapt to living in Iran again after living in the great satanic country for more than twenty years. No matter what the Iranians have to say about it, it still beats Tehran. So maybe he decided to be a sleeper for a few more years and live comfortably, hoping his handlers in Iran would forget about him. I thought I found him in Sydney, but there are conflicting reports about whether the person I saw there was indeed the person who assumed Ward’s identity.”
“You’ll hear from us soon after we get the formalities in place,” Dr. Feldman promised.
After we returned to Paris, I called Benny using his Belgian telephone number.
“Thank you for calling Marnix van der Guilder Trading Company,” said the announcement. “Please press the extension number of the person with whom you wish to speak, or leave a message after the beep.” I pressed Benny’s code for this month, 8*890447**3#, heard a series of beeps, and recognized the familiar sound of an Israeli phone ringtone.
“Bonjour, comment est-ce que je peux vous aider?” -How can I help you?-I heard Benny’s secretary ask in French. Whenever a forwarded call from Europe came in, although a complex code was necessary, the first voice identification was in French to hedge the remote chance that the code was correctly put in, but the caller didn’t know the call would end up in Mossad headquarters just north of Tel Aviv.
“Hi Dina,” I said in Hebrew. “It’s Dan Gordon. Benny back yet?”
“No. Still traveling,” she answered, switching to Hebrew. “OK, please ask him to call my U.S. mobile-phone number.” “Sure.”
I went to get one of those crunchy baguette sandwiches, my diet ruiner for a week, and as I was about to take a bite, my mobile phone rang.
Читать дальшеИнтервал:
Закладка:
Похожие книги на «The Chameleon Conspiracy»
Представляем Вашему вниманию похожие книги на «The Chameleon Conspiracy» списком для выбора. Мы отобрали схожую по названию и смыслу литературу в надежде предоставить читателям больше вариантов отыскать новые, интересные, ещё непрочитанные произведения.
Обсуждение, отзывы о книге «The Chameleon Conspiracy» и просто собственные мнения читателей. Оставьте ваши комментарии, напишите, что Вы думаете о произведении, его смысле или главных героях. Укажите что конкретно понравилось, а что нет, и почему Вы так считаете.