THE SPIDER

PLEASE NOTE:
This is not going to be a guide of how to Hack / Track or Crack software protocols or security systems.
It will however show how the Spider (generic name for government agencies) has kept an eye on its own people at home and abroad
.

Now that you have an understanding of how communications have developed over the last 200 years, let's start investigating how the Spider has intercepted the transmission of data over those last 200 years.

METHOD OF COMMUNICATION HOW IT IS MONITORED
DRUMS: Easily heard by friend or foe.
SMOKE SIGNALS: Easily seen by friend or foe.
   
PERSONAL MESSENGER: Capture the messenger and torture to extract the information
   
THE SENDING OF LETTERS:

Easily intercepted, read and forwarded without the recipient being aware.

This led to the development of the Signet ring.
Hot wax is poured over the flap of the envelope and the design on the Signet ring is pressed into the molten wax thereby making a unique seal.
The only way that the letter could be opened was to break or tamper with the seal. If this were done the recipient would know that persons unknown had read the letter and the information was compromised.

Companies still use the seal system today when they send goods by couriers.

   
MORSE CODE: Easily monitored because physical wire point to point is needed (hence the name sending a Cable or Wire).
The interception is by bridging across the pair of wires and listening to the transmission.
   
TELEX: Same as Morse Code
   
TELEPHONE (OPERATOR ERA):
1900 - 1955
Calls set up via an operator, so it is easy for the operator to transcribe the conversation or for a third party to monitor the call from the exchange.
   

TELEPHONE (STROWGER ERA): 1955 - 1973

SUBSCRIBER DIRECT DIALLING

Operators only used for international calls.

Calls can be monitored at the originating exchange or at any intermediate exchanges the call passes through. There is no need to break into any home to bug their phone because the Spider can have the required phone line or lines cross patched to wherever they want it to go.

Governments set up secure telephone exchanges for their own use with scrambled voice transmission, commonly termed 'Hot Lines'.

   

TELEPHONE (X-BAR ERA):
1973 - 1990

INTERNATIONAL DIRECT DIALLING

INTERNATIONAL PACKET SWITCHED SYSTEMS

Operators only used for countries without I.D.D.

Most calls can be monitored from a central location due to the use of computers for the first time for routing the calls.

Trigger words are incorporated in a phonetic database which once recognised will automatically start recording the call, logging the calling and called number and sending an alert to the Spider.

Trigger words: Bomb, Hijack, Semtex, Gun, Bullets etc.......

It is rumoured that the British secret service has a computer in a central London location that can monitor 50,000 telephone lines at the same time.

   

TELEPHONE (ELECTRONIC ERA) 1990 - 2000+

MOBILE PHONES

E MAIL

INTERNET

INTERNATIONAL SWITCHED DIGITAL NETWORK

ASYMMETRICAL DIGITAL SUBSCRIBER LINE

PRIVATE COMPUTER NETWORKS

Completely electronically controlled, computer switched systems.

The potential for monitoring is awesome. Telephone lines, Mobile lines, Internet lines and e-mail are all under surveillance from some of the most sophisticated monitoring equipment and software imaginable.
The Spider is using software and hardware developed for electronically monitoring 'The Enemy' during the cold war era to monitor it's own citizens

Enormous amounts of data are collected on all individuals from even the most innocent of electronic interchange or transaction.

   
RADIO TRANSMISSION

Easily intercepted as the radio waves can be picked up by anyone with a receiver, or if the transmission is not in the commercial bands of AM / FM and it is using the UHF band, a high-powered radio scanner.

Highly encoded radio signals are used by the Spider utilising Phase modulation, Doppler Shift, Pulse Width modulation and White noise to name but a few,to stop their transmissions being read.

Huge listening stations are established to monitor 'The Enemy'.

Menwith Hills in Yorkshire, England is the biggest listening post in the world and it is run by the American NSA. Its brief is to monitor everyone. That includes you and I.

Home /Spider2

ALL IMAGES AND TEXT COPYRIGHT © Falasha recordings