Чтение онлайн

на главную

Жанры

Binary code: Mystery number one
Шрифт:

SORM-3 is a system for collecting information from all types of communications and its long-term storage.

U.S.

The U.S. Intelligence Community is a system of 16 intelligence agencies whose activities include computerized surveillance and electronic intelligence.

STRATCOM – A special cybersecurity task force in U.S. Strategic Command; integrates nuclear, space, and missile defense.

MAINWAY is an NSA database containing metadata on hundreds of billions of phone calls made through the four largest phone companies in the United States: AT&T, SBC, BellSouth, and Verizon.

Stellar Wind is an electronic communications tracking program, including monitoring email messages, phone calls, financial transactions and internet activity.

Tailored Access Operations (TAO) is a division of the NSA created in 1997 that engages in active and passive surveillance of computers, including hacking and backdoor installation. It is capable of collecting approximately 2 petabytes of network transmitted data per hour.

Boundless Informant is an NSA system for analyzing global electronic communications. It has a huge database, including 14 billion reports on Iran, 6.3 billion on India, and 2.8 billion on the United States.

PRISM is an in-depth Internet traffic surveillance program formally classified as top secret; adopted by the NSA in 2007 as a replacement for the Terrorist Surveillance Program.

DCSNet is an FBI surveillance system that can wiretap any telecommunications device located in the United States.

Main Core is a database that stores personal and financial information on millions of U.S. citizens who may pose a threat to national security. The data is sourced from the NSA, FBI, CIA, and other government sources.

Magic Lantern is a keylogger program sent by the FBI as an email attachment. When activated, it acts as a Trojan horse and allows the FBI to track the activities of an Internet user.

Narus Insight is a cluster-class supercomputer espionage system designed to sniff and analyze network traffic data on the Internet. It uses the Carnivore system as auxiliary data delivery nodes. The operator of the system in the United States is the FBI; users are all U.S. federal agencies.

Carnivore is an automated espionage system for listening to information from websites, analyzing databases on websites, and opening and analyzing emails; an analogue of the Russian SORM-2. An element of the Narus Insight total surveillance supercomputer cluster.

Terrorist Finance Tracking Program – a joint program of the CIA and the U.S. Treasury Department to gain access to the SWIFT transaction database. According to the U.S. government, efforts to counter terrorist activities were compromised after information about the existence of the program was leaked to the media.

X-Keyscore, a secret computer tracking program, is run jointly by the U.S. National Security Agency, the Australian Radio Defense Agency, and the New Zealand Government Communications Security Service. The FBI has created and is actively populating the world's largest database of biometric information on U.S. citizens, including retina, fingerprints, facial structure, scars, voice, language, facial expressions and gestures.

Israel

"Medusa-1" is a program that uses microwave radiation from cell phones to target the subcortical layer of the human brain in order to induce reactions in the brains of those being irradiated that the irradiators want.

"Medusa-2" is a program using DISP Biometric Sensing technology, which uses point detectors of infrared radiation to determine a person's location and posture. With DISP Spectroscopy, the military and gendarmes are able to analyze chemicals in any body tissue, including blood, from a distance.

"Medusa 3" is a spy analysis program.

The users of these programs are:

–Unit 8200 – Responsible for collecting and deciphering electronic intelligence;

–Unit 9900 – Responsible for collecting and deciphering photographic data from aerial and space-based media;

–504th Division – Responsible for gathering information through agent networks and informants;

–Department of Information Security;

–military censorship;

–Operational Management Division ;

–Special Operations Connection ;

–Sayeret Matkal special unit ; Psychological Operations Center;

–Military Intelligence Directorate .

A special place is occupied by Unit 8200, an electronic intelligence unit, part of the Military Intelligence Directorate "AMAN", which collects and decodes electronic information. It is one of the largest such units in the world. In military documents it is listed as Central Collection Unit of the Intelligence Corps. In terms of functions performed, it is comparable to the U.S. National Security Agency.

The Israeli intelligence agency Mossad uses (semi-legally, through fake civilian firms) spying devices that record, through legal and illegal video cameras installed in public places, what is happening in major cities around the world. This is done by Verint, a classified branch of the Israeli intelligence agency Mossad.

This and other Israeli firms have been contracted to tap the phones of citizens of the United States, Canada, European Union countries and Russia, install and maintain, under the guise of office computer programs, spyware components installed in ministries and departments, government agencies, schools, universities, hospitals, etc. All information received is analyzed by the Meduza-3 program.

Rutra looked through the data on other states without emphasizing it. He knew everything about his line of work and more.

It was enough for a start. In the evening, Ruthre was brought his new "official" documents, his security clearance cards and passes, from which he learned that he was now a researcher at a secret institute. Then he was led outside by a security officer through a chain of corridors, elevators, and labyrinths, through the "official" entrance, which was the entrance hall of the closed research institute.

Поделиться:
Популярные книги

Последняя жена Синей Бороды

Зика Натаэль
Любовные романы:
любовно-фантастические романы
5.00
рейтинг книги
Последняя жена Синей Бороды

Найди меня Шерхан

Тоцка Тала
3. Ямпольские-Демидовы
Любовные романы:
современные любовные романы
короткие любовные романы
7.70
рейтинг книги
Найди меня Шерхан

Месть Паладина

Юллем Евгений
5. Псевдоним `Испанец`
Фантастика:
фэнтези
попаданцы
аниме
7.00
рейтинг книги
Месть Паладина

В теле пацана 6

Павлов Игорь Васильевич
6. Великое плато Вита
Фантастика:
фэнтези
попаданцы
5.00
рейтинг книги
В теле пацана 6

Сфирот

Прокофьев Роман Юрьевич
8. Стеллар
Фантастика:
боевая фантастика
рпг
6.92
рейтинг книги
Сфирот

Не грози Дубровскому! Том Х

Панарин Антон
10. РОС: Не грози Дубровскому!
Фантастика:
фэнтези
попаданцы
аниме
5.00
рейтинг книги
Не грози Дубровскому! Том Х

Последний реанорец. Том I и Том II

Павлов Вел
1. Высшая Речь
Фантастика:
фэнтези
7.62
рейтинг книги
Последний реанорец. Том I и Том II

Я — Легион

Злобин Михаил
3. О чем молчат могилы
Фантастика:
боевая фантастика
7.88
рейтинг книги
Я — Легион

Начальник милиции 2

Дамиров Рафаэль
2. Начальник милиции
Фантастика:
попаданцы
альтернативная история
5.00
рейтинг книги
Начальник милиции 2

(Не)свободные, или Фиктивная жена драконьего военачальника

Найт Алекс
Любовные романы:
любовно-фантастические романы
5.00
рейтинг книги
(Не)свободные, или Фиктивная жена драконьего военачальника

Курсант: Назад в СССР 11

Дамиров Рафаэль
11. Курсант
Фантастика:
попаданцы
альтернативная история
5.00
рейтинг книги
Курсант: Назад в СССР 11

Совпадений нет

Безрукова Елена
Любовные романы:
любовно-фантастические романы
5.50
рейтинг книги
Совпадений нет

Вечный. Книга V

Рокотов Алексей
5. Вечный
Фантастика:
боевая фантастика
попаданцы
рпг
5.00
рейтинг книги
Вечный. Книга V

Жена по ошибке

Ардова Алиса
Любовные романы:
любовно-фантастические романы
7.71
рейтинг книги
Жена по ошибке