It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Some features of ATS will be disabled while you continue to use an ad-blocker.
Mar 4 2019 15:39:34 (EST)
Hussein gave the order to start the spy campaign.
It was logged officially 2x.
1x - Domestic.
1x - Foreign.
FISC judge WH meeting?
WH visitor logs are important.
Hussein library CLAS doc move?
Attempt to shelter/protect?
Who has AUTH to obtain?
The More You Know.
Is Amazon Spying on You with the Ring (DoorBot) Acquisition?
the video feeds from its customers' homes in unencrypted format and allows staff around the world to have essentially unfettered access to these videos.
Amazon Workers Are Listening to What You Tell Alexa
published January 2014
In Gore Vidal: History of the National Security State & Vidal on America, TRNN Senior Editor Paul Jay and the acclaimed essayist, screenwriter and novelist Gore Vidal discuss the historical events that led to the establishment of the massive military-industrial-security complex and the political culture that gave us the “Imperial Presidency
If you’re driving a late model car or truck, chances are that the vehicle is mostly computers on wheels, collecting and wirelessly transmitting vast quantities of data to the car manufacturer not just on vehicle performance but personal information, too, such as your weight, the restaurants you visit, your music tastes and places you go.
A car can generate about 25 gigabytes of data every hour and as much as 4,000 gigabytes a day, according to some estimates. The data trove in the hands of car makers could be worth as much as $750 billion by 2030, the consulting firm McKinsey has estimated. But consumer groups, aftermarket repair shops and privacy advocates say the data belongs to the car’s owners and the information should be subject to data privacy laws.
Yet Congress has yet to pass comprehensive federal data privacy legislation.
Sixteen months ago, researchers reported an unsettling escalation in hacks targeting power plants, gas refineries, and other types of critical infrastructure. Attackers who may have been working on behalf of a nation caused an operational outage at a critical-infrastructure site after deliberately targeting a system that prevented health- and life-threatening accidents.
It could be stand down or it could be release the Kraken.