Skip to main content

冷战时中美监控的一件小事

发信人: romus1994 (diwa), 信区: History
标  题: 冷战时中美监控的一件小事
发信站: BBS 未名空间站 (Mon Oct 13 12:07:10 2014, 美东)


哥当年在药厂混的时候,要买一件分析金属含量的仪器,到康州一家仪器公司去做评估
。该公司是业内大老,生产的的等离子体质谱仪不但能测药品中微量金属含量,还可以
应用在分析矿石中金属甚至同位素分布。

观摩完公司看了仪器之后,该公司管sales的SVP请客 - 毕竟是笔三四十万不小的买卖
。这个SVP长得跟前副总统切尼一个模子出来的,一杯红酒下肚后话多得不得了。

这位老兄上世纪七十年代底,八十年代初,改革开放刚开始就在中国走南闯北搞推销,
跑的中国城市比我去过的还多。那时老外在中国可算是稀有动物。是老布什的回忆录还
是谁说的,在北京动物园去玩的时候,里面的动物直勾勾得盯着他看。

有一次切尼先生到北京中科院下的研究所去拉生意做sales pitch。也就进去了一两个
小时。结果回美国后第一天,就有俩西装革履的登门拜访,口袋中牌子掏出来一亮,说
是CIA的,要问他几个问题,把这位老兄唬得一愣一愣的,不知道发生了什么事。结果
CIA的人告诉他,他哪月哪天他在北京去了哪个研究所,哪个点进的哪个店出的,大致
去了研究所哪个部位,他们都知道。除了要切尼先生告诉他们他在里面干了什么,CIA
更关心他在里面看到了什么。CIA似乎对里面建筑构造很熟悉。详细问他去了哪个房间
哪个实验室,里面都有些什么云云。当然是知无不言。后来倒是没有下文。

感觉那时的CIA无孔不入神通广大啊,现在估计不如了。具体到这种事情不知道怎么操
作的。难道研究所门口开杂货店的北京老头真是CIA的特务?

http://gengwg.blogspot.com/

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...