PLEASE NOTE:
This is not going to be a guide of how to Hack / Track or Crack
software protocols or security systems.
It will however show how the Spider (generic name for government
agencies) has kept an eye on its own people at home and abroad.
Now that you have an understanding of how communications have developed over the last 200 years, let's start investigating how the Spider has intercepted the transmission of data over those last 200 years.
METHOD OF COMMUNICATION | HOW IT IS MONITORED |
DRUMS: | Easily heard by friend or foe. |
SMOKE SIGNALS: | Easily seen by friend or foe. |
PERSONAL MESSENGER: | Capture the messenger and torture to extract the information |
THE SENDING OF LETTERS: |
Easily intercepted, read and forwarded without the recipient being aware. This led to the development of
the Signet ring. Companies still use the seal system today when they send goods by couriers. |
MORSE CODE: |
Easily monitored because
physical wire point to point is needed (hence the name sending a Cable or Wire). The interception is by bridging across the pair of wires and listening to the transmission. |
TELEX: | Same as Morse Code |
TELEPHONE
(OPERATOR
ERA): 1900 - 1955 |
Calls set up via an operator, so it is easy for the operator to transcribe the conversation or for a third party to monitor the call from the exchange. |
TELEPHONE (STROWGER ERA): 1955 - 1973 SUBSCRIBER DIRECT DIALLING |
Operators only used for international calls. Calls can be monitored at the originating exchange or at any intermediate exchanges the call passes through. There is no need to break into any home to bug their phone because the Spider can have the required phone line or lines cross patched to wherever they want it to go. Governments set up secure telephone exchanges for their own use with scrambled voice transmission, commonly termed 'Hot Lines'. |
TELEPHONE (X-BAR ERA): INTERNATIONAL DIRECT DIALLING INTERNATIONAL PACKET SWITCHED SYSTEMS |
Operators only used for countries without I.D.D. Most calls can be monitored from a central location due to the use of computers for the first time for routing the calls. Trigger words are incorporated in a phonetic database which once recognised will automatically start recording the call, logging the calling and called number and sending an alert to the Spider. Trigger words: Bomb, Hijack, Semtex, Gun, Bullets etc....... It is rumoured that the British secret service has a computer in a central London location that can monitor 50,000 telephone lines at the same time. |
TELEPHONE (ELECTRONIC ERA) 1990 - 2000+ MOBILE PHONES E MAIL INTERNET INTERNATIONAL SWITCHED DIGITAL NETWORK ASYMMETRICAL DIGITAL SUBSCRIBER LINE PRIVATE COMPUTER NETWORKS |
Completely electronically controlled, computer switched systems. The potential for monitoring
is awesome. Telephone lines, Mobile lines, Internet lines and
e-mail are all under surveillance from some of the most sophisticated
monitoring equipment and software imaginable. Enormous amounts of data are collected on all individuals from even the most innocent of electronic interchange or transaction. |
RADIO TRANSMISSION |
Easily intercepted as the radio waves can be picked up by anyone with a receiver, or if the transmission is not in the commercial bands of AM / FM and it is using the UHF band, a high-powered radio scanner. Highly encoded radio signals are used by the Spider utilising Phase modulation, Doppler Shift, Pulse Width modulation and White noise to name but a few,to stop their transmissions being read. Huge listening stations are established to monitor 'The Enemy'. Menwith Hills in Yorkshire, England is the biggest listening post in the world and it is run by the American NSA. Its brief is to monitor everyone. That includes you and I. |