SO
IS BIG BROTHER WATCHING YOU????
-
So as to the above question 'Is big brother
watching you????
- Damn
right he is and he isn't your brother!
-
- In
the preceding case study lets break it down to its constituent
parts.
-
-
-
-
-
-
- Logging
on to your home or office computer:
- When you log
on to your computer and connect to either the Web or to your
e-mail account you have to go via an ISP.
- The ISP
(internet service provider) allocates your machine an unique
id which is known as an 'IP ADDRESS'
- (IP=internet
protocol).You
can give yourself any name you chose as an e-mail name but the
IP address that is used for the transmitted message never changes
if you have a STATIC IP (used in major companies for locked
profiles) or if you go via an external ISP the
IP ADDRESS that is allocated to you while you are on line
is easily traceable because ISP's purchase a number
range of block licenses . So even though you think that
no one knows who you are when you call yourself 'Sexmachine@anydomainname.com' the ISP knows
who you are because to get the account you had to fill an application
form with all your personal details and when you log on your
ISP checks your validity before you can gain access to their
server. Anyone with access to the IP address list also knows
who you are.
-
- Who
used to allocate IP Addresses
- In the murky
world of Internet governance, few organisations play as critical
a role as the 'Internet Assigned Numbers Authority (IANA)'.
- The only problem
is that, for all practical purposes, IANA exists in name
only. It does not have an official charter, bank account or even
a staff.
- It is simply
a nifty term someone coined 14 years ago to describe various
duties performed by Jon Postel, a researcher at the University
of Southern California's (USC) Information Sciences Institute
(ISI) and one of the Internet's inventors.
- The US
Defence Department said it gave IANA $450,000 in
late 1995 and has given it millions over the years.
- NSI said it pays Postel
$240,000 a year to manage the .us domain, a country specific
code that Postel for some reason registered under his name and
ISI's.
- ''Why he did
that was never explained,'' said Tony Rutkowski, a former executive
director of the Internet Society and now a strong advocate
for reform. ''But it was a revenue opportunity for ISI.''
- Postel denied
anything sinister was involved. He said the university simply
''volunteered'' to handle the domain in 1986 and has been doing
so ever since. The money, he said, just covers expenses.
-
- Who
allocated IP Addresses now.
The Internet
Corporation for Assigned Names and Numbers (ICANN) is the non-profit corporation
that was formed to assume responsibility for the IP address space
allocation, protocol parameter assignment, domain name system
management, and root server system management functions performed
under U.S. Government contract by IANA and other entities.
- It has affiliated
organisations throughout the world doing the same thing in their
own countries.
- Basically its
a different name, but the Spider still has control
-
-
- E-mails:
- Have unique
addressing header words which contain:
- The destination
it is going to, who sent it and other routing information as
well as the message itself.
-
- In the old dates
of posted mail, letters had to be contained within an envelope
with an address and a stamp on it.
- If you were
not worried about the contents being read then a postcard could
be sent instead of a letter.
- As the community
grew Zip codes / Post codes were developed to make delivering
the mail simpler.
- A Zip / Post
code can tell the reader where you live without the full address
having to be known providing they have the 'Look up Table'.
- To intercept
a letter, read its contents and to forward it on without the
recipient being aware required no more than
- steam to loosen
the gummed flap.For added security you could always add a seal;
not very secure!
- In these days
of e-mails the same is true.
- Anyone with
the right software or knowledge can intercept your e-mails by
setting up what is known as a 'Remailer'.
- They sit across
or in line with the network and are 'Transparent' which
means that you do not know that it is there.
- All your e-mails
are received by them copied and passed on without you being aware.
- In the commercial
world they are akin to 'Fire walls'.
-
- There are companies
that sell encryption software to the public with the byline that
it will secure your e-mails.
- Rubbish! All
encryption software must be submitted for validated by certain
government bodies.
- The NSA
in America and GCHQ in the UK who act on behalf of the
NSA in the UK.
- Irrespective
of what the government body is called this is where the software
ends up.
- If they can
break it, you get it back with a certificate and you can then
sell it in the commercial domain.
- If they can't
break it, you never get it back! Without a certificate you can't
sell it.
- No explanation
of refusal of certification is given.
- The most secure
means of encryption used to be 'Double Encryption', but
this was made illegal and by the same token encryption keys greater
than the DES standard of 56 bits is also frowned upon.
- The longer the
encryption key the greater the security.128 bit is good but 1028
/ 2048 or 4096 bit would be very safe.
- If the NSA
and GCHQ can break your encryption it means they can read
any e-mail sent with that encryption method.
- The Spider
can read your e-mails.
- E-MAILS
ARE TOTALLY INSECURE!
-
-
- Mobile
phones:
- Have a SIM
card inside them that contain the unique id of the phone / user
and the network to which it is connected.
- If you have
ever lost or forgotten your PIN you can call your airtime supplier
and quote your name, address and
- password
and they will tell you your PIN number or reset your phone over
the air by sending it a reset signal that will reinitialise your
SIM card but no one elses.
- When you make
or receive calls, the number that has called you or the number
that you have called is recorded by the networks computer along
with the duration of the call. Just look at your itemised bill.
- It is possible
due to the way that the mobile network is constructed to triangulate
your position from the adjacent cells,so the Spider can
track you via your mobile phone.Not just what you say, but where
you are saying it from.
- The actual voice
transmission is not encoded so anyone with a scanner can listen
to your call or record it.
- The famous cases
of the Princess of Wales talking to her lover (Squiggygate)
and the Prince of Wales wishing to be a tampon being utilised
by his lover Camilla Parker Bowles springs to mind.
- Thieves have
been able to make duplicates of SIM cards from day one!
- MOBILE
PHONE ARE TOTALLY INSECURE!
Home
/ The
Spider7
ALL
IMAGES AND TEXT COPYRIGHT © Falasha recordings