This is how it all started. Computers picked out key words in messages from a continually updated data base of words and phrases being used in most languages which described terrorist acts or explosives, etc. The traffic was logged and passed on to a human for further checking.
This system has been upgraded over the years since it's inception and now all messages passed through any medium can be read and analysed. The Skype system is apparently the only system which they could not penetrate. Whether it is still the case is uncertain. The company owning the system wold not give the Government access or any details regarding the algorithm which they use for encrypting and decrypting the calls. Every other mobile and land line based company handed over all details to the spooks in order that they could eavesdrop and record any messages.
Every telephone bill in America and in some other countries is generated by an Israeli owned company. The companies keep records of how long, charge rates and from whom to whom the calls were made. By using 'spider' programs they can scan the data to see who is regularly calling who and when, thus building up profiles and timelines of high and low phone traffic. They only need a few names after that to map out all of the parties.
No comments:
Post a Comment