SO IS BIG BROTHER WATCHING YOU????

 
So as to the above question 'Is big brother watching you????
Damn right he is and he isn't your brother!
 
In the preceding case study lets break it down to its constituent parts.
 
 
 
 
 
 
Logging on to your home or office computer:
When you log on to your computer and connect to either the Web or to your e-mail account you have to go via an ISP.
The ISP (internet service provider) allocates your machine an unique id which is known as an 'IP ADDRESS'
(IP=internet protocol).You can give yourself any name you chose as an e-mail name but the IP address that is used for the transmitted message never changes if you have a STATIC IP (used in major companies for locked profiles) or if you go via an external ISP the IP ADDRESS that is allocated to you while you are on line is easily traceable because ISP's purchase a number range of block licenses . So even though you think that no one knows who you are when you call yourself 'Sexmachine@anydomainname.com' the ISP knows who you are because to get the account you had to fill an application form with all your personal details and when you log on your ISP checks your validity before you can gain access to their server. Anyone with access to the IP address list also knows who you are.
 
Who used to allocate IP Addresses
In the murky world of Internet governance, few organisations play as critical a role as the 'Internet Assigned Numbers Authority (IANA)'.
The only problem is that, for all practical purposes, IANA exists in name only. It does not have an official charter, bank account or even a staff.
It is simply a nifty term someone coined 14 years ago to describe various duties performed by Jon Postel, a researcher at the University of Southern California's (USC) Information Sciences Institute (ISI) and one of the Internet's inventors.
The US Defence Department said it gave IANA $450,000 in late 1995 and has given it millions over the years.
NSI said it pays Postel $240,000 a year to manage the .us domain, a country specific code that Postel for some reason registered under his name and ISI's.
''Why he did that was never explained,'' said Tony Rutkowski, a former executive director of the Internet Society and now a strong advocate for reform. ''But it was a revenue opportunity for ISI.''
Postel denied anything sinister was involved. He said the university simply ''volunteered'' to handle the domain in 1986 and has been doing so ever since. The money, he said, just covers expenses.
 
Who allocated IP Addresses now.
The Internet Corporation for Assigned Names and Numbers (ICANN) is the non-profit corporation that was formed to assume responsibility for the IP address space allocation, protocol parameter assignment, domain name system management, and root server system management functions performed under U.S. Government contract by IANA and other entities.
It has affiliated organisations throughout the world doing the same thing in their own countries.
Basically its a different name, but the Spider still has control
 
 
E-mails:
Have unique addressing header words which contain:
The destination it is going to, who sent it and other routing information as well as the message itself.
 
In the old dates of posted mail, letters had to be contained within an envelope with an address and a stamp on it.
If you were not worried about the contents being read then a postcard could be sent instead of a letter.
As the community grew Zip codes / Post codes were developed to make delivering the mail simpler.
A Zip / Post code can tell the reader where you live without the full address having to be known providing they have the 'Look up Table'.
To intercept a letter, read its contents and to forward it on without the recipient being aware required no more than
steam to loosen the gummed flap.For added security you could always add a seal; not very secure!
In these days of e-mails the same is true.
Anyone with the right software or knowledge can intercept your e-mails by setting up what is known as a 'Remailer'.
They sit across or in line with the network and are 'Transparent' which means that you do not know that it is there.
All your e-mails are received by them copied and passed on without you being aware.
In the commercial world they are akin to 'Fire walls'.
 
There are companies that sell encryption software to the public with the byline that it will secure your e-mails.
Rubbish! All encryption software must be submitted for validated by certain government bodies.
The NSA in America and GCHQ in the UK who act on behalf of the NSA in the UK.
Irrespective of what the government body is called this is where the software ends up.
If they can break it, you get it back with a certificate and you can then sell it in the commercial domain.
If they can't break it, you never get it back! Without a certificate you can't sell it.
No explanation of refusal of certification is given.
The most secure means of encryption used to be 'Double Encryption', but this was made illegal and by the same token encryption keys greater than the DES standard of 56 bits is also frowned upon.
The longer the encryption key the greater the security.128 bit is good but 1028 / 2048 or 4096 bit would be very safe.
If the NSA and GCHQ can break your encryption it means they can read any e-mail sent with that encryption method.
The Spider can read your e-mails.
E-MAILS ARE TOTALLY INSECURE!
 
 
Mobile phones:
Have a SIM card inside them that contain the unique id of the phone / user and the network to which it is connected.
If you have ever lost or forgotten your PIN you can call your airtime supplier and quote your name, address and
password and they will tell you your PIN number or reset your phone over the air by sending it a reset signal that will reinitialise your SIM card but no one elses.
When you make or receive calls, the number that has called you or the number that you have called is recorded by the networks computer along with the duration of the call. Just look at your itemised bill.
It is possible due to the way that the mobile network is constructed to triangulate your position from the adjacent cells,so the Spider can track you via your mobile phone.Not just what you say, but where you are saying it from.
The actual voice transmission is not encoded so anyone with a scanner can listen to your call or record it.
The famous cases of the Princess of Wales talking to her lover (Squiggygate) and the Prince of Wales wishing to be a tampon being utilised by his lover Camilla Parker Bowles springs to mind.
Thieves have been able to make duplicates of SIM cards from day one!
MOBILE PHONE ARE TOTALLY INSECURE!

Home / The Spider7

ALL IMAGES AND TEXT COPYRIGHT © Falasha recordings