It looks like you're using an Ad Blocker.

Please white-list or disable AboveTopSecret.com in your ad-blocking tool.

Thank you.

 

Some features of ATS will be disabled while you continue to use an ad-blocker.

 

Help ATS via PayPal:
learn more

Warning: Wikileaks May Have Just Been Hacked By NSA

page: 8
42
<< 5  6  7    9 >>

log in

join
share:

posted on Oct, 21 2016 @ 07:17 PM
link   

originally posted by: stinkelbaum
a certain irony, a company that's made its name via illegally hacked means cries loudly when itself is hacked.

lol


I have a friend




posted on Oct, 21 2016 @ 07:19 PM
link   
a reply to: IAMTAT

All these theatrics just so Hilary can take office to make her unfaithful, perverted husband happy.


Nonsense, it really is. This will be due to all Hilarys backers paying so much money they have gone blind with it and have powers like this to blow up the internet because they did not get their way.

Thank goodness for hackers and those who keep this world on an even balance.



posted on Oct, 22 2016 @ 04:40 AM
link   
how about just create a site called "wikihacks" ?? and then before long you'll be either dead or forced to be confined in some embassy, but at least you'll have spilled the beans on the nwo



posted on Oct, 22 2016 @ 12:42 PM
link   

originally posted by: stinkelbaum
a certain irony, a company that's made its name via illegally hacked means cries loudly when itself is hacked.

lol


If people would quit calling DDoS attacks "hacking," that'd be great. Wikileaks doesn't hack either. The latest releases (including the DNC drops, and many others) aren't hacked. They're leaked to Wikileaks, who then leaks them to the public. ANY person/group that hacks any system do not go through a third party source, as they want all credit for it. DDoS is not a hack. Wikileaks does not hack. Julian Assange is not a hacker. He most likely could be, considering he is a programmer, but he doesn't hack. Quit with the liberal rhetoric.



posted on Oct, 22 2016 @ 12:51 PM
link   

originally posted by: imthegoat

originally posted by: stinkelbaum
a certain irony, a company that's made its name via illegally hacked means cries loudly when itself is hacked.

lol


Wikileaks doesn't hack either. The latest releases (including the DNC drops, and many others) aren't hacked. They're leaked to Wikileaks, who then leaks them to the public.


Cracks me up when "they" try to justify Leaked - - - as not hacked.

Apparently, receiving stolen property absolves you.



posted on Oct, 22 2016 @ 01:02 PM
link   

originally posted by: Annee

originally posted by: imthegoat

originally posted by: stinkelbaum
a certain irony, a company that's made its name via illegally hacked means cries loudly when itself is hacked.

lol


Wikileaks doesn't hack either. The latest releases (including the DNC drops, and many others) aren't hacked. They're leaked to Wikileaks, who then leaks them to the public.


Cracks me up when "they" try to justify Leaked - - - as not hacked.

Apparently, receiving stolen property absolves you.


Wikileaks is a journalistic organization. It's no more illegal for them to possess the documents than CNN, Fox, MSNBC et al. Just because you think they're the devil, doesn't mean they actually are, jsyk. Quite frankly Wikileaks IS what journalism is all about. Not conforming to government controlled propaganda and scripted segments.



posted on Oct, 22 2016 @ 01:03 PM
link   

originally posted by: Annee

originally posted by: imthegoat

originally posted by: stinkelbaum
a certain irony, a company that's made its name via illegally hacked means cries loudly when itself is hacked.

lol


Wikileaks doesn't hack either. The latest releases (including the DNC drops, and many others) aren't hacked. They're leaked to Wikileaks, who then leaks them to the public.


Cracks me up when "they" try to justify Leaked - - - as not hacked.

Apparently, receiving stolen property absolves you.


Did you cry foul when Trumps tax returns were obtained illegally by the Times? How about Romney's? No? Didn't think so. You have a personal vendetta against Wikileaks and/or Assange, not how the data is obtained.



posted on Oct, 22 2016 @ 01:13 PM
link   

originally posted by: StargateSG7
a reply to: IAMTAT

Well Duhhhh !!!!!

Of COURSE ATS is a honeypot!

As a former member (kinda, sorta, maybe past and present)
of the intelligence community, can tell you that the NSA,
DIA, and a few other 3, 4 and 5 letter agencies around the
world have targeted websites such as ATS, RENSE,
ZERO HEDGE, HOTMAIL, OUTLOOK, GMAIL, etc,
for YEARS (if not decades now!).

Since SSL2 was broken a few years back, man-in-the-middle
servers have been put on almost all major telcos, Cable-Co's,
and Edge Servers so that basic metadata (and sometimes
full interception) can be gathered and datamined for
connections, associations, and technical data.

In the USA, for the most part, only a general sweep
of emails that look for the specified "FIVE EYES"
dictionary terms are run through on an automated
basis. When found terms trigger a secondary examination
by rather advanced datamining software, the systems do
a more specific associative dig into the data before it
EVER gets flagged for a look by a human SIGINT/HUMINT analyst.

Only SPECIFICALLY TARGETED individuals get a long-term,
continuous datamining software assignment on ALL their
communications. If foreign, the person simply gets monitored
from the get go. If US born or a citizen and resident in-country,
GENERALLY a court order is obtained (although I have seen that
NOT happen a few times!) before a SIGINT/HUMINT person/team
is assigned.

And those targets are assigned threat levels that take into account
personality traits (is he/she violent or passive?), connections to other
persons (do they have relatives in Syria or Yemen), types of activities
(are they an ATS blogger or Patriot Website operator?) or their education
and expertise level (i.e. are they a chemist, bioligist or nuclear tech or ex-military?).

Only after about 10-15 steps is ANY targeted individual scanned
on a continuous basis and since the current ACTIVE Person-of-Interest
database is about 600,000 persons in size even that gets whittled
down to less than 20,000 and then about 2500 to 10,000 depending
upon year, that get personal teams of SIGINT/HUMINT operators to
take a closer more personal look!

The CIA and NSA don't like to share their almost IDENTICIAL SearchBook
databases (user interfaces are nearly identical to Facebook but designed
for Persons of Interest!). And the turf wars EVEN IN 2016 are RIDICULOUS !!!!
I just goto the DIA one...it's much easier to deal with a self-discliplined
Major or Captain! No BS from any idiot cement-condo-sucking urbanite
barely-post-millennial managers!

So don't flatter yourselves, thinking you're being scanned by the NSA!
A machine does that mostly for time, date, location, to/from data
and any subject matter keywords metadata and only a FEW lucky
ones get any real-world human attention!

The blackouts you saw today LIKELY started from Virginia and New Jersey
and went on from there! Possibly internal-to-USA agency started this
because of Wikileaks but you can't TOTALLY discount Russia, North Korea,
China and Eastern European Criminal Organization IN THAT ORDER being
the cause...my bet is this is an exercise by NSA to test disruption software
BEFORE giving it a full Cyberwarfare Whack at Russia by Early-to-Mid December!

TOUCHE !!!!!

P.S. Fer Da Spooks: Don't Mess With Me!
My Friends Can Send Your Planet into the Sun!
Don't Tick Them Off !!!!



you covered almost all the bases
the info is out there



posted on Oct, 22 2016 @ 01:21 PM
link   

warning: "the wikileaks account has be compromised" is a psyop.
I wasn't sure before so I posted some evidence that assange was never running the wikileaks account that you can see from well before he lost internet, a normal person who was just being hysteric and believing assange was truly dead would have accepted this evidence and moved on, but instead CTR continues pushing these threads constantly all day. they're scared of the new information that's about to drop, and so they want people questioning wikileaks and dogpiling them instead of looking at their leaks

what CTR wants you to believe:
>assange was running the wikileaks account up until he lost internet
the truth:
>assange wasn't running the account, it was someone else from wikileaks who sometimes issued quotes from assange and ALWAYS talked about him in the third person [I've also seen CTR trying to debunk my posts by claiming this is similar to how trump refers to himself in the third person, not true because wikileaks literally prefaces quotes from assange himself with "#Assange:"
what CTR wants you to believe:
>wikileaks always tweeted with the utmost professionalism, they only started acting strange after assange lost internet
the truth:
>they've always engaged in bantz and the retweeting of all sorts of obscure news sources as long as they were talking about wikileaks
what CTR wants you to believe:
>wikileaks is being uncharacteristically hostile towards clinton and her campaign
the truth:
>wikileaks has always been hostile to people who lie about wikileaks, which right now is mostly clinton's campaign and her shills
remember, CTR wants you to waste the last weeks of the campaign attacking wikileaks and believing they're now a shill operation. what they DO NOT want you to do is to continue digging wikileaks emails and prompting evidence of corruption

CTR's main strategy these days seems to be distract because they know they can't actually convince anyone on /pol/ to vote for hillary


boards.4chan.org...



posted on Oct, 22 2016 @ 01:41 PM
link   

originally posted by: Annee

Apparently, receiving stolen property absolves you.



Clinton Foundation tenet and principles. And lying about it too.



posted on Oct, 22 2016 @ 04:10 PM
link   
He is alive



SORRY LOOK LIKE A 2012 VID

edit on 22-10-2016 by Trillium because: (no reason given)



posted on Oct, 22 2016 @ 04:30 PM
link   

originally posted by: Realtruth

originally posted by: Annee

Apparently, receiving stolen property absolves you.



Clinton Foundation tenet and principles. And lying about it too.


Deflection.



posted on Oct, 22 2016 @ 04:58 PM
link   

originally posted by: Annee

originally posted by: Realtruth

originally posted by: Annee

Apparently, receiving stolen property absolves you.



Clinton Foundation tenet and principles. And lying about it too.


Deflection.



Agreed !


The Clinton's have made an art-form, out of deflection.
edit on 22-10-2016 by Realtruth because: (no reason given)


(post by chopper2017 removed for a serious terms and conditions violation)

posted on Oct, 22 2016 @ 09:40 PM
link   
 


off-topic post removed to prevent thread-drift


 



posted on Oct, 22 2016 @ 09:40 PM
link   
 


off-topic post removed to prevent thread-drift


 



posted on Oct, 22 2016 @ 09:41 PM
link   
 


off-topic post removed to prevent thread-drift


 



posted on Oct, 23 2016 @ 03:41 AM
link   
Cyber war.

Just like real war.

Satan and his demons always need more war.

Isn't that right google computer?



posted on Oct, 23 2016 @ 03:47 AM
link   
a reply to: chopper2017

Good article. You don't realise how long this has been going on.

In WWI the Espionage Act was created at the behest of the church to outlaw Jehovah's Witnesses. And their book The Finished Mystery.

edit on 23-10-2016 by aintnoonespecial because: (no reason given)

edit on Sun Oct 23 2016 by DontTreadOnMe because: Quote Crash Course



posted on Oct, 23 2016 @ 10:06 PM
link   
HOOOOOOYAH !!!!!


A new technique envisioned by a team of Canadian
Grad Students from the Univerity of Toronto that used
fuzzy-logic Quadratic and Elliptic Curve estimation allows
them to create "Islands of Possibilities" in terms of finding
POSSIBLE combinations of values to INCLUDE and/or EXCLUDE
for character, byte, word or large integer-size data that are
many times used in an AES-256 encryption key.

It SEEMS their theory holds some water when put to the test!

====

A longer explanation of what I speak is in this thread:
www.abovetopsecret.com...
(see near bottom of page 3)

===

We shall now REALLY SEE if we can break the Wikileaks Insurance Files !!!!



new topics




 
42
<< 5  6  7    9 >>

log in

join