All these types
of cards have a magnetic strip onto which is encoded certain
unique data of the individual to which it is issued.
When you use
a ATM machine data such as time / location and the transaction
requested is stored on the bank's central computer; just look
at your bank statement.
Swipe cards
which also double as identity cards issued to employees by most
companies can also act as tracking devices and in government
and financial institutions they do.
Every time you
use the swipe card to gain access, the request is sent to the
company's central computer which checks to see if you have the
right permissions. If you do access is granted, if you don't
access is denied.
So all the security
department has to do to see who has gone where and when is to
check the access log, either by zone or by unique user access
code (PIN) encoded onto all swipe cards. Each employee has a
different PIN.
All employees
might have the same looking swipe card but have a different level
of access permissions.
The Spider
can obtain these logs by court order or hack the company's central
computer to get access to them.
YOUR
MOVEMENTS AT WORK ARE BEING MONITORED!
Office
/ Home Phone Line:
The national
phone system of most countries is now digital.
You are now
able to get Itemised phone bills, Call barring, Last Number Redial,
Calling Number Display and various other goodies all courtesy
of the digital age.
All companies
now have call logging systems which record the number and time
durations of the numbers that you call.
They can bar
access to international and premium line calls.
As with mobile
phones your home and office phone are ENTIRELY INSECURE!
All electronic
data can be accessed by the Spider because it is store
on a computer and computers are inherently unsafe.
Just look at
the recent spade of Hacking that has occurred over the
last year to some of the most highly secure sites:
Hotmail.com
Microsoft.com
Compaq.com
FBI
All of the ISP's have suffered serious hacks
and these are
only those that have made the newspapers.
Most never do,
as the companies concerned do not want to undermine people's
confidence in the security of their computer systems.
The malicious
computer viruses that have been inflicted onto the computer environment
in the same time period is astonishing.There is now in excess
of 50,000 known viruses present in 'The Wild' (computer
networks) and more are being found every single day. That is
why virus protection programs for computer systems are updated
on a weekly / monthly basis
Over 10 years
ago an American company called 'Quarterdeck' released
a piece of software called 'PC ANYWHERE'.
It was marketed
as a diagnostic / support aid.
This software
allowed the system administrator to view a user's computer and
not only to see what software was loaded onto the pc but also
to view exactly what the user was typing and all of this was
done REMOTELY!!
That meant that
the system supervisor could be miles away from the user's pc
and be able to monitor exactly what the user was doing.
Various other
types of this software has been developed by other companies
over the preceding years and the complexity / speed and usability
has been enhanced dramatically.
Hackers use
a similar but more refined computer program today.
THE SPIDER
IS THE SYSTEM SUPERVISOR FOR ALL COMMUNICATION NETWORKS!