Swipe / Credit / ATM Cards:
All these types of cards have a magnetic strip onto which is encoded certain unique data of the individual to which it is issued.
When you use a ATM machine data such as time / location and the transaction requested is stored on the bank's central computer; just look at your bank statement.
Swipe cards which also double as identity cards issued to employees by most companies can also act as tracking devices and in government and financial institutions they do.
Every time you use the swipe card to gain access, the request is sent to the company's central computer which checks to see if you have the right permissions. If you do access is granted, if you don't access is denied.
So all the security department has to do to see who has gone where and when is to check the access log, either by zone or by unique user access code (PIN) encoded onto all swipe cards. Each employee has a different PIN.
All employees might have the same looking swipe card but have a different level of access permissions.
The Spider can obtain these logs by court order or hack the company's central computer to get access to them.
YOUR MOVEMENTS AT WORK ARE BEING MONITORED!
 
Office / Home Phone Line:
The national phone system of most countries is now digital.
You are now able to get Itemised phone bills, Call barring, Last Number Redial, Calling Number Display and various other goodies all courtesy of the digital age.
All companies now have call logging systems which record the number and time durations of the numbers that you call.
They can bar access to international and premium line calls.
As with mobile phones your home and office phone are ENTIRELY INSECURE!
 
 
All electronic data can be accessed by the Spider because it is store on a computer and computers are inherently unsafe.
Just look at the recent spade of Hacking that has occurred over the last year to some of the most highly secure sites:
  • Hotmail.com 
  • Microsoft.com 
  • Compaq.com
  • FBI
  • All of the ISP's have suffered serious hacks 
and these are only those that have made the newspapers.
Most never do, as the companies concerned do not want to undermine people's confidence in the security of their computer systems.
The malicious computer viruses that have been inflicted onto the computer environment in the same time period is astonishing.There is now in excess of 50,000 known viruses present in 'The Wild' (computer networks) and more are being found every single day. That is why virus protection programs for computer systems are updated on a weekly / monthly basis
Over 10 years ago an American company called 'Quarterdeck' released a piece of software called 'PC ANYWHERE'.
It was marketed as a diagnostic / support aid.
This software allowed the system administrator to view a user's computer and not only to see what software was loaded onto the pc but also to view exactly what the user was typing and all of this was done REMOTELY!!
That meant that the system supervisor could be miles away from the user's pc and be able to monitor exactly what the user was doing.
Various other types of this software has been developed by other companies over the preceding years and the complexity / speed and usability has been enhanced dramatically.
Hackers use a similar but more refined computer program today.
THE SPIDER IS THE SYSTEM SUPERVISOR FOR ALL COMMUNICATION NETWORKS!
 

Home / The Spider9

 
ALL IMAGES AND TEXT COPYRIGHT © Falasha recordings