Israel
"Medusa-1" is a program that uses microwave radiation from cell phones to target the subcortical layer of the human brain in order to induce reactions in the brains of those being irradiated that the irradiators want.
"Medusa-2" is a program using DISP Biometric Sensing technology, which uses point detectors of infrared radiation to determine a person's location and posture. With DISP Spectroscopy, the military and gendarmes are able to analyze chemicals in any body tissue, including blood, from a distance.
"Medusa 3" is a spy analysis program.
The users of these programs are:
–Unit 8200 – Responsible for collecting and deciphering electronic intelligence;
–Unit 9900 – Responsible for collecting and deciphering photographic data from aerial and space-based media;
–504th Division – Responsible for gathering information through agent networks and informants;
–Department of Information Security;
–military censorship;
–Operational Management Division ;
–Special Operations Connection ;
–Sayeret Matkal special unit ; Psychological Operations Center;
–Military Intelligence Directorate .
A special place is occupied by Unit 8200, an electronic intelligence unit, part of the Military Intelligence Directorate "AMAN", which collects and decodes electronic information. It is one of the largest such units in the world. In military documents it is listed as Central Collection Unit of the Intelligence Corps. In terms of functions performed, it is comparable to the U.S. National Security Agency.
The Israeli intelligence agency Mossad uses (semi-legally, through fake civilian firms) spying devices that record, through legal and illegal video cameras installed in public places, what is happening in major cities around the world. This is done by Verint, a classified branch of the Israeli intelligence agency Mossad.
This and other Israeli firms have been contracted to tap the phones of citizens of the United States, Canada, European Union countries and Russia, install and maintain, under the guise of office computer programs, spyware components installed in ministries and departments, government agencies, schools, universities, hospitals, etc. All information received is analyzed by the Meduza-3 program.
Rutra looked through the data on other states without emphasizing it. He knew everything about his line of work and more.
It was enough for a start. In the evening, Ruthre was brought his new "official" documents, his security clearance cards and passes, from which he learned that he was now a researcher at a secret institute. Then he was led outside by a security officer through a chain of corridors, elevators, and labyrinths, through the "official" entrance, which was the entrance hall of the closed research institute.
Chapter 3. I can see you, but you can't see me
The next day, Rutra was personally greeted by Vasilyevich. He had a joyful face. Literally from the doorstep he began to teach Rutra.
– What's the first rule?
– Up to 80% of information can be obtained from open sources, the main thing is to be able to understand it correctly," Rutra answered boldly.
– The second one?
– If you want to hide something, put it in the most visible place.
– Third? – The examiner kept up.
– Don't get caught," Ruthra summarized, studying Vasilievich's reaction with a slanted gaze.
– You make me suspicious, though I think we understand each other. We'll work together," the colonel summarized and continued: – For example, such a situation: let's say we send our satellite to the satellite providing communication of the international information service. What do we want to know? Missile launch codes? Troop movements? The background radiation of the strategic command center? No! We want to know how they keep this whole system running. That's what we did during the Cold War when we had the doctrine of total annihilation. And when we realized we couldn't do that without damaging ourselves, we came up with the doctrine of weakening and subjugation. You know what I mean?
– I'm starting to realize
– Something like that. So now the main efforts of intelligence are aimed at finding out who, when, where and how much currency has been made. If we are a rich state, it means that we live well and can influence the world around us. We are a force to be reckoned with, we can develop new weapons. And if we are poor, no one needs our goods, we can temporarily resist with weapons, use internal propaganda, but we will still slip into poverty, dictatorship and, as a consequence, into the social abyss. However, as they say, the truth is somewhere near. The fact is that all important scientific information from all advanced institutes of the world, patent offices, research centers, certification and logging centers flows to the center. Therefore, "big brother" always knows in advance – what, who can do, can influence it. And yet it is no less important to know the banal statistics. For example, if somewhere in a third-world country there is exploration for minerals, which, due to its technological backwardness, this country can neither extract nor use, then we are interested in this, as it is not only us. The world has long been divided, everything is interconnected. Or some state will dramatically increase its consumption of rare earth metals. We calculate what it is for and what it does, in what product it is possible to use it. Therefore, all the goals have already been defined, niches are occupied. If there is a change in some market, what does it mean? That someone needs something more. Some state suddenly orders some kind of equipment for mines, for example. For what purpose? To mine something. What can it extract? All this is analyzed, the relationship is studied. What can be produced from this raw material? How much machinery is purchased? When? Service life? Capacity? This makes up the chain.
Ruthra glanced obliquely at Vasilievich. They were almost at the entrance to the central hall of Zero. Vasilievich continued nonchalantly:
– That's roughly what you were doing, except you were analyzing when, for example, the lights went on in the encryptor's office and when they went off, how to make a multi-stage chain to figure out the encryptor, to get into his social circle, to somehow launch an artificial mouse close to his post, which, after sneaking closer, would scan the contents of his machine by communicating with his smartphone through his computer mouse. That's assuming you still have to get in there, or it can be done from a satellite. From that, you concluded what and how he encrypts, when and what telegram he's working on, what's in it, who it's from, who it's addressed to. And another custodian analyzed another office of the same kind, where it came from, from which dignitary. Your next colleague analyzed who came to this person, his circle of communication, where the command came from, how it was processed, where it went, what happened afterwards. From all of this, a picture was formed of what command was communicated, what was the meaning of it, what consequences it led to and why. And if it was possible to intercept the encryption, we knew that its content was this consequence. It's roughly the same here, but it has to do with the end result of it all, with power and money. With a lot of power and a lot of money. The president of an oil-bearing country sneezed – the price of fuel went up somewhere. The president of a multinational company took a test – we should know the result… Soon civilian technology will surpass military technology. We should follow the development of laboratories by calculating the contracts for the receipt of goods and raw materials. Why? Because no one has ever abolished lying. So we can't be deceived. Control, control and control. Stocks, bonds… You'll do that too. Analyze the same thing, but from the other side. It's an important indicator of the consequences of a planned or planned event. I'm interested in everything: statistical summaries, statistical data. A lot of data will flow to you.