It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Some features of ATS will be disabled while you continue to use an ad-blocker.
Originally posted by damajikninja
Well, if you change your network card(MAC), and get a new IP address (either from the ISP or from a router), your traffic will still be flowing through one fiber gateway back to the ISP. There is still a leg of the network that you HAVE to pass traffic through in order to get out to the internet. Even if you change your MAC and IP (which you cant do every second), they can still filter all the traffic from your network node and find your data stream again. Granted, it is gonna take em a second to re-locate you, but its gonna take you a second to switch out MAC/IP every time you do it.
EDIT: Not to mention that your cable/dsl modem will still have the same MAC if its in bridge mode, and the same IP if it isn't in bridge mode. See what I mean? Even if they can't track your NIC's MAC or IP, they can just filter any traffic coming from your modem. And as said above, even if you change out your modem, they can still start looking for you in the local node's traffic back to the ISP.
The only effective way to keep running from them is to change physical routes as often as possible. Like changing ISP's you run through, or being wireless and hopping from one physical layer (ISP/node) to another. As long as you do that while changing your MAC everytime you hop, you can evade them fairly well.
But even if you do that, they can still locate your data stream by waiting for your traffic to show up in other predictable places. Lets say they they know you go to a certain website, like ATS, and they want to monitor you. All they have to do is filter data going in/out of ATS servers, and wait for your username to show up in some packet data. Then they'll know which data stream is yours, which means they know where your data is coming from, which means they know what ISP you are on, and which Node you are on. From that point on, they can filter all your internet traffic until you change physical routes and they lose you again. Not to mention they will have a pretty damn good geographic fix on you.
Its all about not being predictable, and to keep them guessing about where your traffic is going to come through. Cause once they know where to look, they can find you and monitor you relatively easy. And let's not forget that the FBI has monitoring equipment freshly installed at all ISP head-ends, so they certainly have the resources to look at any data stream on any network.
Originally posted by ejsaunders
Of course, ECHELON and its related systems are apparently so advanced these days they don't even need to be hardware level, they can monitor you regardless of where you live or what type of computer you use.
Originally posted by ZombieAssassin
This is most certainly bogus. The way trace route works it it sends a packet through differnt Hops across the country. Therefore if the NSA was monitoring on this att IP EVERY one of your tracerts to ANY website would have that. Otherwise they would only see the packets you send when you go to yahoo.com not places like f-theUS.com or whatever. Tracert just shows you the hops it makes when going to the destination you put in.
Originally posted by damajikninja
Wow, look at me! The Thread Killer!
No really, I didn't mean to completely bring this thread to a halt, but the stuff I posted above was important IMO. Just wanted everybody to be more aware of how things work.
[edit on 6/27/2007 by damajikninja]
Plans for the "secret room" were fully drawn up by December 2002, curiously only four months after Darpa started awarding contracts for TIA. One 60-page document, identified as coming from "AT&T Labs Connectivity & Net Services" and authored by the labs' consultant Mathew F. Casamassima, is titled Study Group 3, LGX/Splitter Wiring, San Francisco and dated 12/10/02. (See sample PDF 1-4.) This document addresses the special problem of trying to spy on fiber-optic circuits. Unlike copper wire circuits which emit electromagnetic fields that can be tapped into without disturbing the circuits, fiber-optic circuits do not "leak" their light signals. In order to monitor such communications, one has to physically cut into the fiber somehow and divert a portion of the light signal to see the information.