tag:blogger.com,1999:blog-136471062358582351.post7584694324928902609..comments2023-06-02T03:12:35.935-07:00Comments on The SubVersion Trilogy: The SubVersion Complex, Chapter ThirteenUnknownnoreply@blogger.comBlogger1125tag:blogger.com,1999:blog-136471062358582351.post-22114388305935281592014-06-02T15:18:33.186-07:002014-06-02T15:18:33.186-07:00There is no way that search item isn't flagged...There is no way that search item isn't flagged. There would have to be bots on the system watching for someone to enter that tag, set to alert someone to alert someone else if someone typed it in. She would have to do some fancy code work to circumvent it, which shouldn't be too hard if she is such a computer wizz. <br /><br />Also, I don't know if you realized this before, but different classification levels do not share networks. Unclass, secret, and top-secret all have complete separate hardware, harddrives, hard lines and protocols. Special projects, if they are sensitive enough, may even rate their own completely separate system. It is implausible that she would be able to access the file number for a top secret project on an unclassified system. Ryanhttps://www.blogger.com/profile/10149992370708449951noreply@blogger.com