Internet - Another Trap For People - Alternative View

Internet - Another Trap For People - Alternative View
Internet - Another Trap For People - Alternative View

Video: Internet - Another Trap For People - Alternative View

Video: Internet - Another Trap For People - Alternative View
Video: 5 Eerie Individuals Who Used The Internet As A Trap 2024, May
Anonim

The Parasitic System, in which we now live, is very much afraid of normal people, so it tries to constantly monitor everyone. Yes, it looks more like schizophrenia than life, but parasites don't know any other way - they are stupid …

Until recently, it was believed that the "World Wide Web" is a global, unique and uncontrolled thing. It seems that providers do not belong to any single corporation or organization, and therefore it is impossible to establish control over them. But in reality this is not the case. Despite the fact that the Internet allows people from all over the world to communicate with each other, do not forget that the Network was developed by the American military, who are very interested in the question: what people are doing on the Internet, who are they looking for, with whom they communicate, what they write about … However, all these questions are of great interest to the governments of many states.

There are many ways to establish control over a person's life. Many of them are just related to the use of Internet technologies. For example, today, probably, there is no person who would not know why there are barcodes on packages. This set of stripes and numbers makes it possible to control the prices and quantity of the goods received, how much is bought and how much is left. Upon purchase, the barcode is scanned, the value of the goods is fixed, and new data is entered into the electronic invoice. If necessary, all this information can very quickly appear on the Web. According to experts who are engaged in exposing conspiracies, barcodes do not pose a real threat, because they are too primitive. But some of them, on the contrary, are of the opinionthat the use of barcodes is the first step towards mass monitoring of everything that exists. In developed countries, barcodes are used by postal services that can track mail via satellites. The purchased item is monitored from the place of purchase to the owner's home.

Even more information is received through credit cards, with the help of which it is possible to determine what, where, when and in what quantity a person bought, what services he pays for. And on the day when cash disappears from circulation, credit cards can become a valuable source of information not only about a person's acquisitions, but also about his life in general. So, already at the present time, banking services, which are carried out via the Internet, are increasingly developing, thus, personal data of a person, and with them fingerprints, DNA samples, letters - all this is collected, transmitted and stored around the world in databases.

Another way of control is with chips that are implanted under the skin. And this is not a fairy tale, they may become reality in the near future. So, in particular, the VeriChip Corporation has already established the production of subcutaneous chips. And the president of this company suggested to George W. Bush, who at that time was the president of the United States, to chip all immigrants so that they could be easily found if necessary. Moreover, the company actively offers its products to hospitals, and in 2004, the use of chips for medical purposes was approved in the United States. Moreover, in the West at the moment, chips have been introduced to a large number of children of the elite strata of society, military personnel, people suffering from dangerous diseases, as well as criminals. Currently, not only in America, but also in Europe,the idea of introducing chips under the skin of people is advertised and lobbied by all available means.

The only structures that support the chipping of the population without any reservations are the security services. Moreover, a method of forced implantation of chips has already been invented - with the help of a sniper rifle. The new technology was invented by a company from Denmark Empire North, and the invention itself was named ID Sniper. The system includes a microchip, a software package, and the rifle itself. Immediately after the implantation of the chip is made, a photo of the person is taken using a video camera mounted on a rifle for further study. After that, the person can be monitored via satellite.

In addition, the information revolution, which began in the middle of the last century, played an important role in establishing total control. This became the reason for the interest of intelligence agencies of various states in a variety of digital gadgets. The first to translate this interest into reality were the Americans in cooperation with the British. In 1947, the leaders of the two countries signed an agreement on cooperation in the field of electronic espionage, that is, all the data that one side received was transmitted to the other. But later the amount of information increased so much that it became more and more difficult to intercept and process it. Moreover, the interests of the Soviet Union, the most probable enemy, extended practically to the whole world. Only Western Europe was under British control. The Americans controlled only small regionswhich hosted their own military bases. Therefore, it became necessary to attract new partners. But, despite the very good relations with the member countries of the NATO military bloc, none of them was invited to cooperate. Therefore, Australia, Canada and New Zealand were involved. Nevertheless, information processing was still carried out exclusively by specialists from the United States and Britain.

In 1971, a project of an electronic global interception system was developed, called the P-415. The author of the development was the National Security Agency. Thus, huge opportunities were obtained for intercepting and processing data anywhere in the world. Spy satellites were launched into orbit. In addition, parabolic antennas were installed in Europe and America, which scanned the air, as well as centers for monitoring networks. All these components were subsequently combined into a single system, which was named "Echelon". Thus, the whole world was divided into sectors, for which the branches of the system were responsible. Thus, North Africa, Western Europe, and part of Russia up to the Urals are under the control of the British Center. Eastern part of Russia and the American continent - controlled by the American National Security Agency,and the South Asian and Pacific regions by the intelligence services of New Zealand and Australia.

Promotional video:

Apart from these countries, several stations of the system have been installed in Japan and Germany, as well as in Israel. Recently, China has been among the Echelon participants, on whose territory two top-secret stations have been built to intercept data from the eastern part of Russia. It is noteworthy that the Americans initially listened to the Chinese, but did so with the help of another NSA station, which is located in Hong Kong, and which was later transferred to the ownership of the Chinese.

Due to its technical characteristics, Echelon is able to intercept 99% of all information transmitted in the world. It is obvious that it is extremely difficult to cope with such a huge flow of information on time, therefore high-speed computers "Cray" are installed in the analytical centers.

It is clear that one state cannot finance such a large-scale project, therefore, most of the corporations that participated in the creation of the system benefited greatly from cooperation with the special services. Thus, in particular, the US car companies used the secret data obtained by the CIA on Japanese car manufacturers. To provide US energy companies with information on new developments in the field of energy, the whole Asia-Pacific conference, which was held in 1997 in Seattle, was overheard.

Some analysts associate the Echelon project with the development of a software called PROMIS, with the help of which it is possible to track and coordinate various information about network systems: to detect submarines, to make forecasts on the movement of the stock market.

If you believe the rumors, the US National Security Agency has already learned to extract a "voice fingerprint", that is, there are voice samples in the computer's memory, by which any voice can be easily identified in the sound stream. Thus, if "Echelon" has registered the voice of a certain person, then it can track the telephone conversations of the person who owns this voice, all over the world.

At present, the Echelon program includes ships, satellites, reconnaissance aircraft, radars, thousands of agents from America, Great Britain, Canada and New Zealand who control almost the entire planet. The leadership of some of the special services that are part of the system are beginning to gradually admit that this system does exist. However, all the representatives of the special services justify their actions (surveillance, wiretapping, interception of mail) by the fight against terrorism.

As for Russia, here too the collection of information is carried out very closely, although it is not advertised. Until 1998, the Internet here was considered one of the most control-free communication channels. It is clear that this could not last long. Therefore, in 1998, the State Committee for Communications of Russia began to introduce special equipment designed to establish control over all information that was transmitted on the Web. This system received the official name SORM, that is, the System of technical means for ensuring the functions of operational-search activities. If the equipment is connected to the Internet, it allows you to intercept any mail that is of interest to law enforcement agencies. At the same time, the complex works very simply: all information that is transmitted on the Web is divided and scanned for certain "key" words. Today, almost all provider firms that exist in Russia are connected to the SORM system.

At the same time, it should be noted that this system is effective only for internal use. To intercept information that comes from abroad, another system is used - SOUD, or the System of Unified Accounting for Data on the Enemy. The agreement on the creation of this system was officially signed by the member states of the Warsaw Pact back in 1977. Its creation was aimed at ensuring the safety of the 1980 Olympics, but it started working a year earlier, in 1979.

The system combined intelligence not only of the Soviet Union, but also of Bulgaria, the German Democratic Republic, Poland, Hungary, Czechoslovakia, Mongolia, Vietnam and Cuba. The system contained constantly updated information about Western politicians, businessmen, military men, scientists and journalists. Today SOUD has been transformed into a Russian intelligence system.

But that's not all. Since the 1960s, the US military has developed a communications network (simply put, the Internet) that could withstand even a nuclear attack. Through this network, all military and university sites and computers were connected. In 1981, the network was divided into military and civilian. The military component of the Internet gives rise to some experts to argue that such well-known search engines as Yahoo! and Google is a side effect of the NASA project. According to one hypothesis, both of these search engines were designed and created in order to detect potentially dangerous information for America, as well as collect data about those people who often use certain keywords and expressions in queries.

Moreover, the Google search engine has already patented a method of monitoring online games, with the help of which it draws certain conclusions about the desires and motives of the players. Other search engines are also actively cooperating with the intelligence services. At the same time, Google remains one of the most powerful and complete directories for satisfying almost any human request. In addition, here you can find pictures of any corner of the planet, as well as with the help of a webcam, see the places that are of most interest.

This search engine is developing very quickly, so it is possible that very soon enough information will accumulate here to completely master the life of mankind.

I must say that the use of Social Networks, which are very popular in the modern world, also pose a great danger to humans. Of course, on the one hand, there is a huge amount of unique content, including preferences, requests, and more. But on the other hand, during registration, the user needs to enter his personal data: first and last name, date of birth, email address. At the same time, all the data provided by some of the social networks, for example, Facebook, can be used in their personal interests, and moreover, they will not bear any responsibility for this.

If we talk about the present tense, then it should be noted that the establishment of total control over people is gaining momentum. So, in particular, in the United States of America this year, an amendment to the law was extended, which makes it possible to intercept e-mail and wiretap telephone conversations of American residents without court orders, if there is a danger of a terrorist attack.

In addition, a new division was created within the FBI - the National Domestic Comminications Assistance Center, whose main task was to develop new surveillance technologies, which includes surveillance through the World Wide Web, interception of electronic messages, and wireless communications (including Skype).

As for the service called Skype, the company Microsoft, which is its owner, has given consent for the intelligence services to listen to conversations and read user correspondence. A similar situation can be traced, for example, in Ukraine. For a long time, the service was a serious barrier for law enforcement agencies in the course of surveillance, because ciphers were used that reliably protect information from hacking. Now, according to the privacy policy of the service, law enforcement agencies can receive personal data of users, the content of correspondence in the event of a legitimate request.

In addition, it should be recalled that last year Microsoft patented a program of "lawful interference", which allows the judiciary and law enforcement agencies to intercept information without the knowledge of the owners, to eavesdrop on their conversations …

Thus, it seems that humanity is in a network cage, from which it is almost impossible to get out. And we are not talking about persecution mania, although from all of the above, it may well develop. It’s just that you don’t feel very comfortable when you know that every step you take, every action is controlled and can be used against you …