It looks like you're using an Ad Blocker.

Please white-list or disable AboveTopSecret.com in your ad-blocking tool.

Thank you.

 

Some features of ATS will be disabled while you continue to use an ad-blocker.

 

Sites like ATS are monitored by an analyst and assigned a threat level

page: 14
32
<< 11  12  13    15  16 >>

log in

join
share:

posted on May, 28 2008 @ 03:04 AM
link   
SIPR and CAC cards?


SECRET clearances and CAC cards do not a INFOSEC analyst make.

Really what is going on here?

Gardening is not my forte, but I did stay at a Holiday Inn last night.


Could there be a strange maybe ironic correlation going on here between the use of manure as fertilizer and Bovine Scat (B.S.)?

Regardless the thread seems to have strayed off into who knows what, who has what, and who is what. I'm not criticising anyone personally. (Insert Kittens and Bunnies)

Anyway, Happy Gardening.
Fnord!



posted on May, 28 2008 @ 07:18 AM
link   
reply to post by MikeboydUS
 


Yep. People just trying to figure out who has access to what. Kind of like trying to smoke out the cabin and see who was already in there.



posted on May, 28 2008 @ 08:55 AM
link   
Unless the poster admits that they are in the spook squad and I highly doubt a good spook would reveal himself for fear of reprisal from his handlers, there is absolutely no way for you to know that someone is a spook here or not.

You guys can spend days or weeks arguing the security clearance issues without resolution.

Having had a TOP SECRET clearance myself when I served in the USAF, I do understand security issues.

One thing is for sure. Unless you have a legitimate NEED TO KNOW, you will never know. Also, having a specific clearance does not automatically guarantee you access to information either.

Have a Great Day !



posted on May, 28 2008 @ 10:52 AM
link   

Originally posted by nexusmagazine
I guess it must be just one more technique for flushing out who knows what.
Duncan


Hi Duncan...

I believe it's called "fishing"


The better the bait, the better the catch




posted on May, 28 2008 @ 10:56 AM
link   

Originally posted by Evisscerator
Unless the poster admits that they are in the spook squad and I highly doubt a good spook would reveal himself for fear of reprisal from his handlers, there is absolutely no way for you to know that someone is a spook here or not.


True unless they tell you in private emails and come for a 'visit'




posted on May, 28 2008 @ 02:38 PM
link   
I would be careful of those anal-ysts.

I hear they're rather retentive.



posted on May, 29 2008 @ 01:46 AM
link   
wow. just, wow. it amazes me how people like you can get so many other people interested in such an unimportant topic. even if agents were watching, why does it matter to know this? is this article meant to be useful or just gossip? i, myself had a conspiracy phase. i later found that questioning authority is of no use. i still search the internet for what today's conspiracy theorists are cooking up in their heads. although i do not enjoy rambling, this is one subject that i can not ignore. there is no point to share your curiosity and alleged "knowledge".



posted on May, 29 2008 @ 08:13 AM
link   

Originally posted by jhill76
Just trying to shed some light on the intelligence community.


They are watching us already. And it goes beyond the ATS, they are monitoring our very lives, our thoughts.

Well, they are welcome to. I have nothing to hide.



posted on May, 29 2008 @ 11:33 AM
link   

Originally posted by Anonymous ATS
wow. just, wow. it amazes me how people like you can get so many other people interested in such an unimportant topic. even if agents were watching, why does it matter to know this? is this article meant to be useful or just gossip? i, myself had a conspiracy phase. i later found that questioning authority is of no use. i still search the internet for what today's conspiracy theorists are cooking up in their heads. although i do not enjoy rambling, this is one subject that i can not ignore. there is no point to share your curiosity and alleged "knowledge".


Not sure who this was addressed to


But are you serious?

"...even if agents were watching, why does it matter to know this?"
"...i later found that questioning authority is of no use"
"...there is no point to share your curiosity and alleged "knowledge"


Originally posted by Spooky Fox Mulder
Well, they are welcome to. I have nothing to hide.


Seems that 'They' are winning the battle


I am of course assuming you two are Americans?

Any society that would give up a little liberty to gain a little security will deserve neither and lose both. - Benjamin Franklin



posted on May, 29 2008 @ 05:35 PM
link   
I agree 100% with your post!!!!!!!! I also believe that many "UFO experts" and alleged contactees and organizations like Mufon etc etc are also piloted by the Intelligence community.....the picture they paint about the UFO & Alien interaction phenomena is not the REAL situation....



posted on May, 29 2008 @ 07:38 PM
link   
This thread makes me have to ask -- do we have a contingency plan here? What if, for whatever reason, the ATS domain is suddenly shut down? Is there a backup forum somewhere? When we search Google for ATS, how do we know which is the official backup board?

If Above Top Secret were marked as too high a threat to exist, for example, the group who makes the decision could use the confusion afterward to mislead members and keep us from connecting with each other again.

I don't inherently mind anyone 'watching' the site. As long as we're not doing anything horrible here, and as long as they're not acting against our free speech (and that's about all we do here), they're just other members.



posted on May, 29 2008 @ 10:24 PM
link   
Dude ,what the heck did you just get done watching Stalag 17 on late night television?Of course these sites are monitored.Don't you know we are fighting "A War on Terror?"Hell,if you're not with us, then you must be against us.
Reality is all smoke and mirrors dude.has been since WW2,probably before that.Light up a doobie ,kicked back and don't worry dude,it's all an illusion.



posted on May, 30 2008 @ 12:43 AM
link   
More information on government dealings in internet forums for those who still don't believe.

Wiki


The Internet brigades (traditional Chinese: 網特; simplified Chinese: 网特;Russian: Веб-бригады) [1][2] are state-sponsored information warfare teams that conduct psychological operations on-line. Such teams are allegedly affiliated with state propaganda departments, military, or secret police forces. They are said to disseminate disinformation and prevent free discussions of undesirable subjects in political blogs and Internet forums by using cyberstalking, cyber-bullying and other psychological warfare methods against political bloggers or other Internet users.[3] Since the existence of Internet brigades is often officially denied, such activities may be defined as "black", covert or false flag operations (or "active measures" according to Soviet terminology)



posted on May, 30 2008 @ 09:20 AM
link   
reply to post by zooplancton
 

So we all live in Fear do not communicate, be good little slaves...What is coming will affect agents to...See cuttingthroughthematrix.com Alan Watt is not afraid, we are all going to die anyway . see free audios..
it is our world not owned by anyone...



posted on May, 30 2008 @ 02:51 PM
link   
PREVIOUS POSTER'S QUOTE:

"You cannot access the SIPRNET without being allowed on the network. There is no way for you (or anyone else here) to access the SIPR side without the specialized equipment and access to either the sat signal, a secured phone, or physical connections."

Hmmm....I can tell you're either quite young...i.e. less than 30 years old
or you don't know enough about the low-level hardware protocols
and/or electrical engineering.

I am assuming your computer systems are TEMPEST certified, because
if they aren't, I can think of 50 ways to get in....

1) Fibre Optic Cable Assemblies: Single Mode and Multimode fibre
can be spliced into with repeater hardware and protocol analyzers
so that I can intercept the base level ATM/SONET packet data.

Packets that are encrypted can be run through various algorithms
to obtain Most-Probable-Key ranges so that. even Triple-AES (768 bit)
encryption is vulnerable to differential analysis and probable
text-form analysis to ontain HASH values and valid key ranges.

Fibre-Optic systems that are "Secured" have Nitrogen or other Inert Gas
injected into the cable housing designed to prevent such splicing and
interceptionby allowing sensors to identify gas-pressurizatioin changes
during a cable splice operaton. HOWEVER I can put a "Clean Box"
around my splice location that is ALSO Nitrogen/Inert Gas infused
and pressurized to the same level so that I can perform
splicing undetected. I can also ground out the surrounding mesh weave
of a fibre optic cable into an electrical bypass so that ANOTHER
splice detection method is foiled.

2) 10/100/1000 megabit Ethernet RJ 45 /Cat 5 & 6 cables I can simply
use inductance to intercept low-level packets or can also INJECT
my own packet streams such as Ping or TraceErt requests
that I can re-intercept to FIND servers or dissassemble Kerberos
and/or other Key Exchange packets.. These I'll use to break in to any server.

3) Cisco/Nortel Routers can be pinpointed and have their routing
management service accounts compromised by simple social engineering
attacks or even using simple electrical interference to reset them back
to their original specs and then I'll upload my own BIOS which will
prevent router shaping & packet transport analysis so that
I can walk in at will intercepting and duplicating packets which will
be send to my off-site packet sniffers.

4) Graphics Cards have Drivers on both Secured Linux & Windows systems
so I can digitally sign the drivers that I create and the next time the BIOS
or graphics drivers are updated, I'll have Ring-0 privileges and then I
can walk across the OS as I please. I can do the same thing by
using Wake-on-Lan or other built-in "Doors" to flash my own signed
BIOS/Drivers into Network Cards, Firewire Cards, USB interfaces, etc
and then get Ring-0 privileges to walk anywhere in the system
to intercept, duplicate or re-direct disk writes, graphics card updates
or packet send/receives as I see fit!

5) I have some other VERY SNEAKY methods which basically
cannot be defended against using standard security protocols
simply because they attack the base underlying hardware that
is common to ALL computer systems no matter where they are
in the world, even IF you use encryption. And if you spooks want
to know about those methods you'll just have to email me
or send me a U2U message.

6) The poster of the above quote is quite mistaken that a smart card
will protect your data, since the social networks that create the
requirements for their use can be infiltrated and of course the base
hardware can be atacked even IF the systems are TEMPEST certified
simply because the original designers of the hardware never envisioned
the lengths some of us will go to get information.



posted on May, 30 2008 @ 03:19 PM
link   
CONTINUED FORM ABOVE:

7) Using Real-Mode BIOS Interrupt 13 and Interrupt 26 to directly
read & write hard drive sectors...If any of you know what that statement
means then YOU ARE truly knowledgeable.....or just old......I can change
Windows protected mode disk reads & writes and stop the CPU for a
Real-Mode tasks such INTR-13 & 26 without Interference from the OS
and write data to flash memory or Hidden sectors for later retrieval.

8) Grid-based encryption breaking algorithms that use differential
analysis and probable content scanning to break the encryption NO MATTER
its key-length...Since I generally know the TYPE of data you're sending
I can get the actual content by analysing for commonalities so that
I can narrow my Encryp/Decryp key ranges down to a manageable level.

Depending upon the algorithms used (Not always AES/DES)
I can visually graph the key values and resulting encrypted streams
against random data and common text or visual data streams so that
I can use my own Visual Cortex (or data mining software) to see
the colour coded visual patterns that indicate which possible
key ranges could be used to decrypt the recorded data stream

Example:" Keyhole/Trumpet/Mentor series USAF/NSA/NRO satellites
(also called "Birds") have ground stations in the Virginias, Carolinas,
Pine Gap, Ft. Meade, Utah, A-51, etc. and the format of this image data
is generally known within the Spook world. ....SO What we do is......

The birds send images to the ground stations using non-repeating keys
that are changed every use and since many use spread-spectrum
communications to do so, this allows me to NARROW my search down
because the very idea of spread spectrum commlinks requires
discrete and KNOWN methods to encode data which I can use to
my advantage when intercepting and decrypting those communications.

Because I know WHERE and WHEN data is sent/received, I can figure out
WHAT is sent and then work from there.

If I can use an audio card and a common antenna to intercept NOAA
satellite images, I can assure you that encrypted commlinks over
spread spectrum can ALSO be decrypted MUCH EASIER that the
spooks think simply by taking advantage of discrete mathematics
and Grid-based processing power. And since they're using the onboard
clocks to synchronize the keys changes I can PREDICT the next
possible range of keys if a pseudo-random number generator is
being used. If your RAND-NUM generator is truly random, then the
task is much more difficult but NOT impossible because
a key cange command SOMEHOW has to be synchronized
on at least one side and then sent to the other and THAT operation
can be sniffed out of thin air.....

SO DON'T use a single method to authenticate and don't assume
that SOMEONE WILL NOT take the time and energy to obtain desired
secrets...Also use TRULY random number generators (i.e. natural based systems) so that variable length encryp/decyp keys can be truly secured.

Want me to fix your encyrp.decryp & other security issues?
That will be $350/hr plus expenses and bonuses - email me here!



posted on May, 30 2008 @ 11:38 PM
link   
No, this site is not being monitored. There are thousands of similar sites. Only the ones who advocate terrorism are monitored.



posted on May, 31 2008 @ 01:45 AM
link   
reply to post by Spiker


Hehehe Credentials please...

Thanks





[edit on 31-5-2008 by zorgon]



posted on May, 31 2008 @ 09:33 AM
link   
reply to post by jhill76
 


WHY ARE YOU CONFUSED SHE OR HE IS TRYING TO WARN OF THE DANGERS OF BEING AND COMMUNICATING ON CONSPIRACY SITES WATCHED BY OUR GOV'T WHICH WILL IN TURN PUT YOU ON A RED LIST OR BLUE LIST TO BE RID OF THOSE WHO OPPOSE OUR GOV'T SHENANIGANS. HOW HARD IS IT TO SEE THIS? I'M SURE YOU ARE JUST PLAYING DUMB FOR THE FUN OF IT. DESTRUCTION OF AMERICA W/THE DUMBING DOWN IS THEIR GOAL!!! MORE TO CONTROL YOU WITH GO TO AL CUPPET SITE LEARN ABOUT YOUR GOV'T FROM HIM A FORMER JOINTS CHIEF OF STAFF. HE HAS PLENTY OF EVIDENCE!!!!!




Mod Edit: All Caps – Please Review This Link.

[edit on 31-5-2008 by 12m8keall2c]



posted on May, 31 2008 @ 09:36 AM
link   
reply to post by Spiker
 


SPIKER YOU ARE WRONG, PLEASE DON'T BE OFFENDED BY WHAT I JUST SAID, RELIGIOUS SITES, ISLAMIC SITES, CONSPIRACY SITES, AND ALL THE ALIEN INTEREST SITES ALOT MORE THAN YOU OR I WILL EVER KNOW!




top topics



 
32
<< 11  12  13    15  16 >>

log in

join