ARPANET

Arpanet The Guilty Secrets of the Internet

It is perhaps known that the Internet has been set up on a US military program, the Arpanet program, which was made up of 1969. This network was an "invisible" network of alternative methods of communication between American bases. His official goal was "the informational networking of the US defense grid and the survival of this network even in the event of a nuclear attack".

ARPANET

But the real cause of it s of the hyper-network is hidden a little behind the words. The main concern that led to the Arpanet was that if the Soviets found a way to dismantle American communications networks, the President of the United States would and its generals were losing the ability to launch their nuclear missiles. Thus, without the possibility of retaliation, the Soviets could proceed undisturbed with their own offensive plans (the fact that the Soviets had no such concerns says much about their military technological lead until the 1970s, a lead that the Americans did not admit even today). Also, if the Soviets succeeded in blocking the U.S. communications, there was a danger that the U.S. to dissolve due to the multiple internal frictions and parastatal groups that have always operated within it. So an invisible "net" was needed that would stretch over the USA. and would "connect" them under the authority of the White House and – more importantly – the Pentagon. An invisibility cloak that would impose and assert Power, that would replace the "American" identity when it was lost under nuclear terror.

This "net" was finally the Arpanet, which was made with the help of young specialists from the most developed American polytechnics, the main one being the Stanford Research Institute. It was actually a simple program: they connected with cables signaled all the military bases to each other, put some relay satellites in geosynchronous orbit, and created a digital communication "protocol", the NCP later evolved so that no one could eavesdrop on information from a single intermediate "hub", incorporating various data encryption and "masking" techniques.

NCP has today evolved into TCP / IP (Transmission Control Protocol / Internet Protocol) communication, while the Arpanet program was officially "abandoned" by 1990 after giving its lights (ie, transferring its technology) to the NSFnet (National Network) network. Science Foundation (National Science Foundation Network) launched 1986, connecting all major American universities, and later the entire planet. NSFnet is the true name of the Internet…

1983 the US Army has created yet another network connected to the Internet in an "invisible" way to serve and complete its original goals Arpanet. This "invisible" network within the network is called MILnet, that is Military Network, Military Network, and while it is a piece of the Internet, it is relatively "invisible" to most users.

arpanet1987_large

We can be sure that many Internet secrets even today belong only to the US military. It would seem quite strange that the military that created the global network has not taken measures to be able to deal with situations of espionage or information leakage. Certainly, in its design, various ways to control the that moves on the internet and to trace its traffickers, ways built into the system ("low-level" the programmers call them) unknown even to the most informed security officers of large companies...

BACK DOORS AND MONITORING SYSTEMS

The most common "invisible" ways of monitoring (or "invisible access" to Internet users' systems) are called by hackers "back doors" and are built into almost every network program. A connoisseur of back doors, who would also have at his disposal the "” (that is, the ways to “unlock” or activate them) he could invisibly hack into all the computers on the network, peek into files, learn secrets, without anyone “seeing” him. Maybe someone is doing it right now on your computer and files…

Another example of the "embedding" of surveillance methods into information transmission networks is the US Echelon surveillance system, a system of worldwide monitoring of every conversation and transfer of data through any electronic system, be it the telephone or . The existence of Echelon was leaked early on, but all those who mentioned it until recently were "stigmatized" by the M.M.E. as paranoid and "conspiracy theorists".

2001 confirmed that the Echelon there is indeed and monitor all information transfers! The European Parliament released on 11 July 2001 a 194 (!) Study on Echelon entitled "Reporting on the existence of a Global System for the Watching of Private and Commercial Communications (Echelon Monitoring System)" (2001 / 2098 (INI)) . In this way, his existence ceased to be a "conspiratorial paranoia" and became a reality that he demanded to be dealt with. Even the list of words that Echelon regards as "suspicious" was released, and when he meets them, he activates and searches for more information about the person who used them. The words are several hundred, but there are many really strange words among them. "Illuminati" (a "supposed", "fantastic" and "invisible" group of aspiring global powers who, like yesterday Echelon, is now "conspicuous" by mass media and whoever uses it is condemned as "paranoid" ...)

Of course, the "conspirators" that were confirmed were not justified or repaired (this is another dark story). Significance for this text is that Echelon's existence has been troubled by the parliamentary bodies of Europe, who have discussed how to deal with it. But do not rest: many "conspirators" will remind you that this parliamentary concern was only for the eyes of the public. It is most likely that they discussed the development of a similar European system ...

Another network monitoring system is the FBI system called the "Sarkoboro Box" (Carnivore box). The Carnivore box, the FBI argues, is a system that monitors communications only to individuals suspected of illegal activities (but it is clear that Carnivore can monitor all users). The FBI itself goes a bit further in its statements: "Yes, the Carnivore chews all the data on the network, but eats only the information that the warrants we have received from the courts ... "He is, in a nutshell, selective in his food, so he is also 'carnivorous'. Of course, we have to think, who among us are carnivores enough to eat Carnivore? Are all those who have something to say or move in ways that they do not like in power?

Carnivore has one more interesting feature: it is considered a "passive" way of monitoring, meaning it does not interfere with the network, but only "watches". This basically means that Carnivore is "invisible" to network users, while it can be omnipresent in their communications ...

 

Loukas Kavakopoulos from antidogma.gr

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.

Written by giorgos

George still wonders what he's doing here ...

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).