It looks like you're using an Ad Blocker.

Please white-list or disable AboveTopSecret.com in your ad-blocking tool.

Thank you.

 

Some features of ATS will be disabled while you continue to use an ad-blocker.

 

Check if NSA warrantless surveillance is looking at your IP traffic

page: 6
14
<< 3  4  5    7  8  9 >>

log in

join
share:

posted on Jul, 12 2006 @ 02:19 PM
link   

Originally posted by Indy
You are saying the NSA is so dumb that to monitor your data they need to put in a bloody obvious hop in your tracert.

Wait, wait... What we are referring to is the NSA tapped switch in San Fransisco that was disclosed by a whistleblower working for AT&T. The NSA hired AT&T techies to split a fiber optic backbone to copy all traffic going through the pipe towards their monitoring equipment hidden in a secret room inside AT&T's own building in San Fransisco. Basically 'sffca.ip.att.net' is alleged to be that monitored hop. So all we are saying is that if you see that hop in a trace route, then the NSA is watching. We're not making this stuff up, this whole thing is still in court, and Homeland Security is trying to shut this case down into secrecy.

Related articles:
Wired News published AT&T documents under seal in NSA wiretap case
AT&T Narus Collaboration Sent Your Private Internet Communications to The NSA

We are only making educated guesses about other tapped switches across the country (or the world) inside Level3 or any other ISPs. We don't know with certainty because no whistleblower stepped forward to disclose other monitored hops, but it's obvious there are others.


Originally posted by Indy
Why not just sit outside the front door of a suspect's house with a big ole truck with the words FBI on the site so you can secretly monitor a person's activities.

The analogy is more like this, NSA 'rented' office space inside an already existing building on a busy street, and they installed surveillance camera behind the windows. They are not trying to track any suspect in particular at this point, they are only filming all pedestrians passing by that building and they plan to fish for interesting people's faces at a later time. Now what happened is, a whistleblower revealed what's going on inside that building. So some people are deliberately walking past the windows just to get their face recorded on video out of curiosity, while some other people prefer to walk through different busy streets in the hope of not being monitored. But we don't really know if there are similiar surveillance buildings on other streets, we're just guessing. Makes sense?




posted on Jul, 12 2006 @ 09:29 PM
link   
I hate to break the news to you but the NSA can have taps on every route with every provider in the nation. You will never no. It is likely something that let them monitor very specific data because to mirror everything would be extremely expensive. It would be prohibitively expensive just at one point for one carrier. Imagine trying to do this to get nationwide coverage. That would take some incredible fiber run to the NSA office and imagine the servers you would need to process all the data of the net in the US. Not happening.



posted on Jul, 13 2006 @ 06:34 AM
link   
I find this quite alarming. It concerns the big companies that make routers. It is about installing backdoors into the routers at the time of manufacture FOR the government.

Excerpt:

Cisco, Juniper, Acme Packet, and other Internet hardware makers build wiretap backdoors into their hardware that can allow the government to tap all Internet and network communications. And here's the kicker: The law requiring them to do this hasn't even gone into effect, and the specs aren't even final.

Read the rest: networkingpipeline.com

Scarey, no?

NN



posted on Jul, 13 2006 @ 08:22 AM
link   
ok guys i'm from malaysia on the verge of virtual paranoia..

Tracing route to abovetopsecret.com [74.52.37.180]
over a maximum of 30 hops:

1 32 ms 35 ms 23 ms 219.93.218.177
2 30 ms 23 ms 24 ms 219.93.217.213
3 18 ms 24 ms 24 ms 210.187.133.49
4 30 ms 24 ms 24 ms brf-odsy02-srp1-0.tm.net.my [210.187.135.2]
5 30 ms 23 ms 24 ms 210.187.142.1
6 30 ms 24 ms 23 ms 219.93.174.147
7 30 ms 24 ms 23 ms 219.93.151.226
8 221 ms 216 ms 215 ms POS1-1.IG3.SAC1.ALTER.NET [157.130.210.181]
9 246 ms 215 ms 215 ms 0.so-2-2-0.XL2.SAC1.ALTER.NET [152.63.54.126]
10 222 ms 215 ms 216 ms 0.so-3-0-0.XL2.SCL2.ALTER.NET [152.63.48.94]
11 223 ms 215 ms 216 ms 0.so-7-0-0.BR1.SCL2.ALTER.NET [152.63.57.101]
12 210 ms 203 ms 203 ms ggr2-p3133.sffca.ip.att.net [192.205.33.197]
13 245 ms 251 ms 251 ms tbr1-p012101.sffca.ip.att.net [12.123.12.17]
14 245 ms 251 ms 251 ms tbr1-cl3.la2ca.ip.att.net [12.122.10.26]
15 246 ms 251 ms 251 ms tbr1-cl20.dlstx.ip.att.net [12.122.10.49]
16 246 ms 251 ms 251 ms gar1-p360.dlrtx.ip.att.net [12.123.16.169]
17 246 ms 251 ms 251 ms 12.119.136.18
18 270 ms 276 ms 276 ms vl31.dsr01.dllstx3.theplanet.com [70.85.127.29]
19 270 ms 276 ms 276 ms vl22.dsr02.dllstx2.theplanet.com [70.85.127.76]
20 271 ms 276 ms 275 ms vl2.car02.dllstx6.theplanet.com [12.96.160.55]
21 282 ms 276 ms 275 ms b4.25.344a.static.theplanet.com [74.52.37.180]

Trace complete.

now, what does it mean..?



posted on Mar, 25 2007 @ 04:46 PM
link   
A bit of background info.....

A "Hop" could simply be a routing device that "IS" the internet. Without routers moving packets between networks (the internet is simply lots and lots of little networks all joined together), there is no internet.

Every router has at least an IP address. Because all our home/office PCs generally use the TCP/IP protocol for communication, then so too do these routers.

Every time you run a tracert command, it sends a special packet to these devices. As it is encountered by a device, it sends a packet back. Every packet has a time stamp on it, and off this, the "Round Trip Time" is determined (this is usually the numbers that read, 63ms for example).

At the same time, the device sends with the return packet information about itself (either an IP address, DNS address or * if that information was not returned, was lost, or blocked en-route by a firewall or IDS somewhere preventing its return).

As the packet goes on its journey, it is forwarded to the "next hop" router in the chain of routers that it has determined is the shortest/quickest path (usually) to the destination. The packets being sent back keep going until the packet reaches its destination.

That is the output you are seeing after running tracert.

The FBI had a system called "Carnivore". en.wikipedia.org...(FBI)

Sniffers are usually passive devices; they are attached to a network segment and record anything and everything that passes it. It is undetectable (unless you know how to look for it). I won't be putting that particular info on here.


now, what does it mean..?

Assuming that they are indeed monitoring that point, and that they are still monitoring that point now, it means your data is being monitored.


[edit on 25-3-2007 by mirageofdeceit]



posted on Jun, 6 2007 @ 01:51 PM
link   
Tracing route to nsa.gov [12.110.110.204]
over a maximum of 30 hops:

8 1716 ms 1651 ms 1274 ms tbr1.dvmco.ip.att.net [12.123.207.170]
9 1191 ms 1198 ms 1979 ms tbr1.sl9mo.ip.att.net [12.122.10.222]
10 1255 ms 1956 ms 1745 ms tbr1.wswdc.ip.att.net [12.122.10.29]
11 * 1659 ms 1685 ms ar2.wswdc.ip.att.net [12.123.8.65]

Ok so am I being tracked? so far I lack the sffca. part.



posted on Jun, 6 2007 @ 05:42 PM
link   
obviously this thread revived, and I went back through it all and noticed that if I tracert normal sites, even gov sites, I usually dont even go through AT&T, but and INTERESTING TRACERT, look at this.

tracert to www.aljazeera.net
"
10. tbr2.sffca.ip.att.net [12.122.10.42]
11. gbr5.sffca.ip.att.net [12.122.11.90]

Interesting, two of them on the trace to al-jazeera, but no others. numbers 8-12 are AT&T addresses too, but those two have that sffca name in the domain.



posted on Jun, 6 2007 @ 06:44 PM
link   
Thus I would say this is highly SELECTIVE monitoring, in short the monitoring of militant websites, anti-goverment, anti-fed, anti-current government politicians sites. However we cannot validate that till more people try a more selective trace. If we get the same results for the selective tracerts then we abviously have selective monitoring of websites.



posted on Jun, 6 2007 @ 10:11 PM
link   
If there's really a need to trace you, it'd probably be done transparently. I really doubt that doing a traceroute will help you at all.



posted on Jun, 6 2007 @ 10:41 PM
link   
Apparently it does. Besides which how many people actually know how to do a tracert? I sure as heck never had a clue such a thing was possible untill I found this thread.



posted on Jun, 6 2007 @ 11:04 PM
link   
But this only refers to the AT&T subscribers. What about the others? I have Bright House cable, phone and internet. How can I tell if the NSA has tracking for my ISP?



posted on Jun, 6 2007 @ 11:29 PM
link   

Originally posted by Vekar
Apparently it does. Besides which how many people actually know how to do a tracert? I sure as heck never had a clue such a thing was possible untill I found this thread.

A massive amount of people. It's very simple and widely used... I've been using it for diagnostics for years now.

All this shows is what hops your connection takes. Nothing more. Basically, the internet is just a bunch of hops, and this "magic server" is just another route your connection can take. You really expect it to NOT use an AT&T network every so often?



posted on Jun, 6 2007 @ 11:51 PM
link   
The point of this thread being the jumps it takes that gets reported to the NSA not AT&T. That is the point. Read over the thread a bit, you might find that was the purpose of all this: to find out which hops it takes that reports your information to the NSA. Souljah covered this earlier, on the front page.



posted on Jun, 7 2007 @ 12:49 AM
link   
If I do the tracert command with google.com or yahoo.com I don't get the att ip address, but if I do it with whitehouse.gov, nsa.gov, or cia.gov it does show up (sffca.ip.att.net)




[edit on 7-6-2007 by lin2007]



posted on Jun, 7 2007 @ 01:26 AM
link   
Okay, here are some traceroutes I've done on my iMac. I've noticed that they only trigger on certain web pages.

For example:


aljazeera.net rears this result:

Traceroute has started ...

traceroute: Warning: aljazeera.net has multiple addresses; using 12.120.13.56
traceroute to aljazeera.net (12.120.13.56), 64 hops max, 40 byte packets
1 10.0.1.1 (10.0.1.1) 2.986 ms 0.931 ms 1.351 ms
2 10.101.128.1 (10.101.128.1) 8.823 ms 6.188 ms 5.972 ms
3 pch15.50.tampflerl-rtr1.tampabay.rr.com (65.32.14.254) 8.848 ms 9.479 ms 8.736 ms
4 pos6-0-oc-192.tampflerl-rtr3.tampabay.rr.com (65.32.8.133) 135.636 ms 205.081 ms 13.329 ms
5 pop1-tby-p3-0.atdn.net (66.185.136.57) 9.597 ms 13.118 ms 8.447 ms
6 bb1-tby-p0-2.atdn.net (66.185.136.164) 9.485 ms 8.997 ms 9.741 ms
7 bb2-atm-p2-0.atdn.net (66.185.152.186) 26.912 ms 22.885 ms 21.030 ms
8 pop2-atm-p4-0.atdn.net (66.185.150.3) 20.872 ms 20.060 ms 21.427 ms
9 att.atdn.net (66.185.147.222) 24.738 ms 24.110 ms 23.136 ms
10 tbr2.attga.ip.att.net (12.123.20.206) 85.590 ms 85.232 ms 83.279 ms
11 tbr2.sl9mo.ip.att.net (12.122.10.138) 86.754 ms 85.000 ms 85.613 ms
12 tbr1.sl9mo.ip.att.net (12.122.9.141) 79.243 ms 76.864 ms 77.648 ms
13 tbr2.sffca.ip.att.net (12.122.10.42) 81.462 ms 83.049 ms 83.018 ms
14 gbr5.sffca.ip.att.net (12.122.11.90) 77.948 ms 75.730 ms 78.387 ms
15 * *

Notice the bolded font means I was redirected through the NSA's surveillance server.

While the NSA brings this:
Traceroute has started ...

traceroute to nsa.gov (12.110.110.204), 64 hops max, 40 byte packets
1 10.0.1.1 (10.0.1.1) 1.631 ms 1.014 ms 0.923 ms
2 10.101.128.1 (10.101.128.1) 6.661 ms 12.872 ms 9.048 ms
3 pch15.51.tampflerl-rtr2.tampabay.rr.com (65.32.15.254) 7.327 ms 12.669 ms 10.047 ms
4 pos6-0-oc-192.tampflerl-rtr4.tampabay.rr.com (65.32.8.137) 8.137 ms 9.163 ms 14.985 ms
5 pop2-tby-p0-1.atdn.net (66.185.136.185) 8.158 ms 7.994 ms 9.195 ms
6 bb1-tby-p0-3.atdn.net (66.185.138.208) 9.184 ms 8.659 ms 11.016 ms
7 bb2-atm-p2-0.atdn.net (66.185.152.186) 22.908 ms 22.044 ms 26.640 ms
8 pop2-atm-p4-0.atdn.net (66.185.150.3) 20.796 ms 19.738 ms 22.582 ms
9 att.atdn.net (66.185.147.222) 24.045 ms 25.731 ms 23.239 ms
10 tbr1.attga.ip.att.net (12.122.81.98) 43.663 ms 40.640 ms 45.969 ms
11 cr1.attga.ip.att.net (12.122.12.49) 40.731 ms 43.038 ms 41.721 ms
12 cr1.attga.ip.att.net (12.122.1.174) 42.925 ms 42.678 ms 40.327 ms
13 tbr1.wswdc.ip.att.net (12.122.11.206) 49.220 ms 43.351 ms 42.217 ms
14 ar2.wswdc.ip.att.net (12.123.8.65) 215.691 ms 207.766 ms 253.695 ms
15 12.127.209.214 (12.127.209.214) 47.237 ms 12.127.209.218 (12.127.209.218) 45.974 ms 12.127.209.214 (12.127.209.214) 46.098 ms
16 12.110.110.131 (12.110.110.131) 47.665 ms 54.731 ms 49.805 ms
17 * * *

Note that when I select the NSA's website, I was not put through the NSA's surveillance server.

Apparently, the NSA has trigger webpages, meaning that people attempting to access sites of the NSA's interest will be sent through their server, and will be tracked.

I'm also assuming that if I keep tracerouting to aljazeera, the NSA will notice my increased interest in that sight and 'visit' me to check me out.

Just a theory.


TheRanchMan



posted on Jun, 7 2007 @ 01:31 AM
link   
I've also noticed that I can ping ATS, I can ping almost any website.

For example, I ping Google:

Ping has started ...

PING google.com (64.233.167.99): 56 data bytes
64 bytes from 64.233.167.99: icmp_seq=0 ttl=241 time=49.636 ms
64 bytes from 64.233.167.99: icmp_seq=1 ttl=241 time=48.048 ms
64 bytes from 64.233.167.99: icmp_seq=2 ttl=241 time=50.445 ms
64 bytes from 64.233.167.99: icmp_seq=3 ttl=241 time=48.191 ms
64 bytes from 64.233.167.99: icmp_seq=4 ttl=241 time=47.075 ms

--- google.com ping statistics ---
5 packets transmitted, 5 packets received, 0% packet loss
round-trip min/avg/max/stddev = 47.075/48.679/50.445/1.204 ms


I ping ATS:

Ping has started ...

PING abovetopsecret.com (74.52.37.180): 56 data bytes
64 bytes from 74.52.37.180: icmp_seq=0 ttl=52 time=33.024 ms
64 bytes from 74.52.37.180: icmp_seq=1 ttl=52 time=32.656 ms
64 bytes from 74.52.37.180: icmp_seq=2 ttl=52 time=32.899 ms
64 bytes from 74.52.37.180: icmp_seq=3 ttl=52 time=32.386 ms
64 bytes from 74.52.37.180: icmp_seq=4 ttl=52 time=32.231 ms

--- abovetopsecret.com ping statistics ---
5 packets transmitted, 5 packets received, 0% packet loss
round-trip min/avg/max/stddev = 32.231/32.639/33.024/0.299 ms


Each ping I send is returned. However, when I attempt to ping the NSA web server:

Ping has started ...

PING nsa.gov (12.110.110.204): 56 data bytes

--- nsa.gov ping statistics ---
5 packets transmitted, 0 packets received, 100% packet loss

I sent 5 pings to each website. Google returned all my pings, as well as ATS. The NSA server, however, did not return ANY of my pings. Why is this?

TheRanchMan



posted on Jun, 7 2007 @ 02:15 AM
link   
Hi Ranchman


The reason you're not getting ping responses from NSA servers is because they have their firewalls set to drop pings silently, to simply ignore them

Any firewall on a home DSL modem/router has exactly the same capabilities...

The others you've pinged obviously don't mind folks pinging their servers and thus allow their servers to respond to the pings

Peace



posted on Jun, 7 2007 @ 12:07 PM
link   
Well it appears my theory is being proven slowly, so I did a rerun for a tracert, I would like to share one part that stood out:
tracert:
route to whitehouse.govover a maximum of 30 hops:

8 3083 ms 1228 ms 1200 ms tbr1.dvmco.ip.att.net [12.123.207.170]
9 1471 ms 1140 ms 1187 ms tbr2.sffca.ip.att.net [12.122.12.133]
10 1634 ms 1142 ms 1141 ms ggr2.sffca.ip.att.net [12.123.13.185]

Now another tracert
over a maximum of 30 hops:

Tracing route to aljazerra.com
over a maximum of 30 hops:
9 1572 ms 1200 ms 1317 ms tbr2.sffca.ip.att.net [12.122.12.133]
10 1431 ms 1177 ms 1385 ms ggr3.sffca.ip.att.net [12.122.82.149]
11 1611 ms 1223 ms 1216 ms att-gw.sanfran.level3.net [192.205.33.82]


Now we need 5 more people to do this exact same tracert to see how well my theory is standing up. SO! Lets get started shall we?



posted on Jun, 8 2007 @ 02:17 AM
link   
Not wanting to rain on your parade here, Vekar...

But, I've done a ton of traces to both whitehouse.gov and both aljazerra.com and aljazeera.com

I've done the traces using 8 "looking glasses", 4 in the US, 1 in Australia which is not my own ISP, 2 in Europe and 1in Asia

As posting all these traces is a waste of space, I did not find those ATT servers in any of the traces I did thru the looking glasses...I even used an ATT router to trace to both the hosts you mentioned and that doesnt even route thru the 2 "suspicious" ATT servers !

I think what all this means is many traces you do to lots of sites/ip addys and so on will route thru at least one of the ATT servers you mentioned, and I believe this to be as a result of the ISP you are using and their backbone provider...

So, relax !
You're safe, the NSA arent watching you...

EDIT : P.S - aljazeera.net is the real host you should be looking at too, btw...I tested this one, and found only the ATT router I did for the trace routed the query thru the "suspect" ATT routers, all other routers I used for the trace didnt

Peace


[edit on 8-6-2007 by Rilence]



posted on Jun, 8 2007 @ 01:43 PM
link   
Relax?
Jeez, you need to go back over the original posts. This is a theory I had because some people were not showing NSA monitoring while others did. So I was wondering if it was a result of selective WEBSITE monitoring or do they pick and choose who to monitor. That was the theory, and yes they do monitor people.

Tracing route to aljazeera.net [12.120.9.56]
over a maximum of 30 hops:

9 1289 ms 1174 ms 1326 ms tbr1.sl9mo.ip.att.net [12.122.10.222]
10 1796 ms 1134 ms 2666 ms tbr1.wswdc.ip.att.net [12.122.10.29]
11 1682 ms 1338 ms 1430 ms gbr5.wswdc.ip.att.net [12.122.11.170]

I ran it again, none the less I need more people to do this and POST IT FOR ONCE to prove or disprove anything. So POST YOUR FINDINGS! I dont CARE how long it is! Post it! Prove you actually did the tracert! That is what matters right now, not peoples words but the actual tracert findings.

So once again it appears we are looking at a different kind of monitoring, still I want more people to try this, sadly I doubt we will get any of the original topic posters who are being monitored to come back and do this and post again.

Lastly: I ran tracerts (I posted them) that ARE being sent to the NSA, so yes I AM being monitored. Thank you and goodnight.
Lastly: I do not really care that they are monitoring me, just wondering how long, because if it only started recently they are mighty slow.



new topics

top topics



 
14
<< 3  4  5    7  8  9 >>

log in

join