It looks like you're using an Ad Blocker.

Please white-list or disable AboveTopSecret.com in your ad-blocking tool.

Thank you.

 

Some features of ATS will be disabled while you continue to use an ad-blocker.

 

300 words That Make CIA, FBI, and NSA to Look at Your Site

page: 1
1
<<   2 >>

log in

join
share:

posted on Mar, 7 2004 @ 06:16 PM
link   
I dont know if you guys have seen this but its pretty interesting. Check it out:
------------------------------------------------------------------------

Written by William Knowles
I started collecting 'spook words' this after reading about a rumor that the major intelligence agencies would scan all messages floating around on the Internet looking for something interesting, This is why some paranoid folks say the Internet is so slow, The NSA says that they don't, but that's what the NSA would say. Another rumor to the story is that the NSA and all those other three lettered agencies just don't have the bandwidth to look at all those messages, and that its all those people farting around watching Bugs Bunny on Real Audio from work sucking down all that bandwidth. There may be some truth to the rumors... (read more)

...digital wiretaps have been done on the Internet looking for particular words used by criminal hackers and only a few messages that weren't related to the case were captured and dissseminated. The idea here is that if lots of people add suspicious words to their messages, the world's intel agencies will be too busy with spurious input that they will have to give up reading it all.


Click Here for Full List



posted on Mar, 7 2004 @ 06:19 PM
link   
hmmmm interesting , I take it that all of those flowers in the list are code names for something?



posted on Mar, 7 2004 @ 06:29 PM
link   

Originally posted by pantha
hmmmm interesting , I take it that all of those flowers in the list are code names for something?


Im Guessing they could be code words for secret government projects of some kind. Anybody know?



posted on Mar, 7 2004 @ 06:40 PM
link   
Well, jumping horny toads. I guess it's possible.
There was an AWFUL lot of very common words in there though:
passwords
secure
debugging
interception
fax
top secret
code
zone
basement
If that's true, they could be overwhelmed jus with the word "fax"?



posted on Mar, 7 2004 @ 06:44 PM
link   
If this were true this site would be detected on just about everyword 10 times a day. You would think that the NSA would have shut down sites like this already.



posted on Mar, 7 2004 @ 06:52 PM
link   
i posted somewhere else about this kinda topic with the key\word's i belive i said they were high while righting it ... im sticking to that theroy



posted on Mar, 7 2004 @ 06:53 PM
link   

Originally posted by cyberdude78
If this were true this site would be detected on just about everyword 10 times a day. You would think that the NSA would have shut down sites like this already.


Not really. Why would they shut it down? It would only attract the wrong type of attention on them.



posted on Mar, 7 2004 @ 06:55 PM
link   
cyberdude78
Just because they track and monitor sites like ours doesn't mean that they will close them down, it would be to sus, if all of a sudden a site called abovetopsecret.com disapeared, they just monitor sites and make sure they know what we know


They Probably have a good laugh wadeing through all our stuff



posted on Mar, 7 2004 @ 07:00 PM
link   
I see they got Colonel on there and rightfully so.



I cant see some of those words being true, come on....Retinal Fetish, Bubba the Love Sponge, A, B, C, D, and 7???



posted on Mar, 7 2004 @ 07:03 PM
link   
The more I look at that list of words I start thinking its bogus. It looks more like a bunch of words to stuff in a webpage to get better ranking within search engines. It looks like someone grabed a set of words from a tom clancly book and mixed it with a handful of company names and some words from various linux/unix manual pages. Truthfully I think the goverment would key to encrypted transmissions more than just some key words, because it narrows down the amount of data to analyze.



posted on Mar, 7 2004 @ 07:11 PM
link   

Originally posted by alternateheaven
The more I look at that list of words I start thinking its bogus.


It could be bogus. But I posted it just for fun.



posted on Mar, 7 2004 @ 08:38 PM
link   
Well, they don't log an email / website just because it has a few keywords in it, or even all the keywords in it. They only look for a certain set of words in an email/website and excludes those which have more keywords than they are looking for.

The software that does this is setup to only sniff/log emails for certain sets of words, not the whole list. So one of the rulesets they would have for example, would be to log all emails with the word NSA and Daisy, but exclude those emails if they also have CIA / FBI in them.

So just because your meta tags or emails have a bunch of those words in it doesn't mean they would pick that up, but it's the correct set of words that they look for in messages.



posted on Mar, 7 2004 @ 08:39 PM
link   

Originally posted by Ocelot

Originally posted by alternateheaven
The more I look at that list of words I start thinking its bogus.


It could be bogus. But I posted it just for fun.


That's just what they want you to think



posted on Mar, 7 2004 @ 08:41 PM
link   

Originally posted by crispexi

That's just what they want you to think


Good Point!



posted on Mar, 7 2004 @ 08:58 PM
link   
Waihopai, INFOSEC, Information Security, Information Warfare, IW, IS, Priavacy, Information Terrorism, Terrorism Defensive Information, Defense Information Warfare, Offensive Information, Offensive Information Warfare, National Information Infrastructure, InfoSec, Reno, Compsec, Computer Terrorism, Firewalls, Secure Internet Connections, ISS, Passwords, DefCon V, Hackers, Encryption, Espionage, USDOJ, NSA, CIA, S/Key, SSL, FBI, Secert Service, USSS, Defcon, Military, White House, Undercover, NCCS, Mayfly, PGP, PEM, RSA, Perl-RSA, MSNBC, bet, AOL, AOL TOS, CIS, CBOT, AIMSX, STARLAN, 3B2, BITNET, COSMOS, DATTA, E911, FCIC, HTCIA, IACIS, UT/RUS, JANET, JICC, ReMOB, LEETAC, UTU, VNET, BRLO, BZ, CANSLO, CBNRC, CIDA, JAVA, Active X, Compsec 97, LLC, DERA, Mavricks, Meta-hackers, ^?, Steve Case, Tools, Telex, Military Intelligence, Scully, Flame, Infowar, Bubba, Freeh, Archives, Sundevil, jack, Investigation, ISACA, NCSA, spook words, Verisign, Secure, ASIO, Lebed, ICE, NRO, Lexis-Nexis, NSCT, SCIF, FLiR, Lacrosse, Flashbangs, HRT, DIA, USCOI, CID, BOP, FINCEN, FLETC, NIJ, ACC, AFSPC, BMDO, NAVWAN, NRL, RL, NAVWCWPNS, NSWC, USAFA, AHPCRC, ARPA, LABLINK, USACIL, USCG, NRC, ~, CDC, DOE, FMS, HPCC, NTIS, SEL, USCODE, CISE, SIRC, CIM, ISN, DJC, SGC, UNCPCJ, CFC, DREO, CDA, DRA, SHAPE, SACLANT, BECCA, DCJFTF, HALO, HAHO, FKS, 868, GCHQ, DITSA, SORT, AMEMB, NSG, HIC, EDI, SAS, SBS, UDT, GOE, DOE, GEO, Masuda, Forte, AT, GIGN, Exon Shell, CQB, CONUS, CTU, RCMP, GRU, SASR, GSG-9, 22nd SAS, GEOS, EADA, BBE, STEP, Echelon, Dictionary, MD2, MD4, MDA, MYK, 747,777, 767, MI5, 737, MI6, 757, Kh-11, Shayet-13, SADMS, Spetznaz, Recce, 707, CIO, NOCS, Halcon, Duress, RAID, Psyops, grom, D-11, SERT, VIP, ARC, S.E.T. Team, MP5k, DREC, DEVGRP, DF, DSD, FDM, GRU, LRTS, SIGDEV, NACSI, PSAC, PTT, RFI, SIGDASYS, TDM. SUKLO, SUSLO, TELINT, TEXTA. ELF, LF, MF, VHF, UHF, SHF, SASP, WANK, Colonel, domestic disruption, smuggle, 15kg, nitrate, Pretoria, M-14, enigma, Bletchley Park, Clandestine, nkvd, argus, afsatcom, CQB, NVD, Counter Terrorism Security, Rapid Reaction, Corporate Security, Police, sniper, PPS, ASIS, ASLET, TSCM, Security Consulting, High Security, Security Evaluation, Electronic Surveillance, MI-17, Counterterrorism, spies, eavesdropping, debugging, interception, COCOT, rhost, rhosts, SETA, Amherst, Broadside, Capricorn, Gamma, Gorizont, Guppy, Ionosphere, Mole, Keyhole, Kilderkin, Artichoke, Badger, Cornflower, Daisy, Egret, Iris, Hollyhock, Jasmine, Juile, Vinnell, B.D.M.,Sphinx, Stephanie, Reflection, Spoke, Talent, Trump, FX, FXR, IMF, POCSAG, Covert Video, Intiso, r00t, lock picking, Beyond Hope, csystems, passwd, 2600 Magazine, Competitor, EO, Chan, Alouette,executive, Event Security, Mace, Cap-Stun, stakeout, ninja, ASIS, ISA, EOD, Oscor, Merlin, NTT, SL-1, Rolm, TIE, Tie-fighter, PBX, SLI, NTT, MSCJ, MIT, 69, RIT, Time, MSEE, Cable & Wireless, CSE, Embassy, ETA, Porno, Fax, finks, Fax encryption, white noise, pink noise, CRA, M.P.R.I., top secret, Mossberg, 50BMG, Macintosh Security, Macintosh Internet Security, Macintosh Firewalls, Unix Security, VIP Protection, SIG, sweep, Medco, TRD, TDR, sweeping, TELINT, Audiotel, Harvard, 1080H, SWS, Asset, Satellite imagery, force, Cypherpunks, Coderpunks, TRW, remailers, replay, redheads, RX-7, explicit, FLAME, Pornstars, AVN, Playboy, Anonymous, Sex, chaining, codes, Nuclear, 20, subversives, SLIP, toad, fish, data havens, unix, c, a, b, d, the, Elvis, quiche, DES, 1*, NATIA, NATOA, sneakers, counterintelligence, industrial espionage, PI, TSCI, industrial intelligence, H.N.P., Juiliett Class Submarine, Locks, loch, Ingram Mac-10, sigvoice, ssa, E.O.D., SEMTEX, penrep, racal, OTP, OSS, Blowpipe, CCS, GSA, Kilo Class, squib, primacord, RSP, Becker, Nerd, fangs, Austin, Comirex, GPMG, Speakeasy, humint, GEODSS, SORO, M5, ANC, zone, SBI, DSS, S.A.I.C., Minox, Keyhole, SAR, Rand Corporation, Wackenhutt, EO, Wackendude, mol, Hillal, GGL, CTU, botux, Virii, CCC, Blacklisted 411, Internet Underground, XS4ALL, Retinal Fetish, Fetish, Yobie, CTP, CATO, Phon-e, Chicago Posse, l0ck, spook keywords, PLA, TDYC, W3, CUD, CdC, Weekly World News, Zen, World Domination, Dead, GRU, M72750, Salsa, 7, Blowfish, Gorelick, Glock, Ft. Meade, press-release, Indigo, wire transfer, e-cash, Bubba the Love Sponge, Digicash, zip, SWAT, Ortega, PPP, crypto-anarchy, AT&T, SGI, SUN, MCI, Blacknet, Middleman, KLM, Blackbird, plutonium, Texas, jihad, SDI, Uzi, Fort Meade, supercomputer, bullion, 3, Blackmednet, Propaganda, ABC, Satellite phones, Planet-1, cryptanalysis, nuclear, FBI, Panama, fissionable, Sears Tower, NORAD, Delta Force, SEAL, virtual, Dolch, secure shell, screws, Black-Ops, Area51, SABC, basement, data-haven, black-bag, TEMPSET, Goodwin, rebels, ID, MD5, IDEA, garbage, market, beef, Stego, unclassified, utopia, orthodox, Alica, SHA, Global, gorilla, Bob, Pseudonyms, MITM, Gray Data, VLSI, mega, Leitrim, Yakima, Sugar Grove, Cowboy, Gist, 8182, Gatt, Platform, 1911, Geraldton, UKUSA, veggie, 3848, Morwenstow, Consul, Oratory, Pine Gap, Menwith, Mantis, DSD, BVD, 1984, Flintlock, cybercash, government, hate, speedbump, illuminati, president, freedom, coc aine, $, Roswell, ESN, COS, E.T., credit card, b9, fraud, assasinate, virus, anarchy, rogue, mailbomb, 888, Chelsea, 1997, Whitewater, MOD, York, plutonium, William Gates, clone, BATF, SGDN, Nike, Atlas, Delta, TWA, Kiwi, PGP 2.6.2., PGP 5.0i, PGP 5.1, siliconpimp, Lynch, 414, Face, Pixar, IRIDF, eternity server, Skytel, Yukon, Templeton, LUK, Cohiba, Soros, Standford, niche, 51, H&K, USP, ^, sardine, bank, EUB, USP, PCS, NRO, Red Cell, Glock 26, snuffle, Patel, package, ISI, INR, INS, IRS, GRU, RUOP, GSS, NSP, SRI, Ronco, Armani, BOSS, Chobetsu, FBIS, BND, SISDE, FSB, BfV, IB, froglegs, JITEM, SADF, advise, TUSA, HoHoCon, SISMI, FIS, MSW, Spyderco, UOP, SSCI, NIMA, MOIS, SVR, SIN, advisors, SAP, OAU, PFS, Aladdin, chameleon man, Hutsul, CESID, Bess, rail gun, Peering, 17, 312, NB, CBM, CTP, Sardine, SBIRS, SGDN, ADIU, DEADBEEF, IDP, IDF, Halibut, SONANGOL, Flu, &, Loin, PGP 5.53, EG&G, AIEWS, AMW, WORM, MP5K-SD, 1071, WINGS, cdi, DynCorp, UXO, Ti, THAAD, package, chosen, PRIME, SURVIAC,UFO.



I win



posted on Mar, 7 2004 @ 09:32 PM
link   
Since its pretty much agreed on that broad monitering of websites, email, etc is rather difficult and time consuming, what other methods could be employed to generate a list of persons/emails/whatever to watch? Given the theories about tracking of library records, that would seem a good starting point. Also profiles on somone would probably point to some areas to place a monitoring system. Anyone else have some input on what would throw up a flag to get you looked at closely by the government?



posted on Mar, 7 2004 @ 09:36 PM
link   

Originally posted by alternateheaven
Since its pretty much agreed on that broad monitering of websites, email, etc is rather difficult and time consuming, what other methods could be employed to generate a list of persons/emails/whatever to watch? Given the theories about tracking of library records, that would seem a good starting point. Also profiles on somone would probably point to some areas to place a monitoring system. Anyone else have some input on what would throw up a flag to get you looked at closely by the government?


I would argue that any interesting theological materials checked out by a person raises a flag, things that have a bit of a twisted aspect on religion like paradise lost or dantes inferno. Excellent reads but I wouldnt be suprised if the gov has those titles earmarked as red flags.



posted on Mar, 7 2004 @ 09:39 PM
link   

Originally posted by Agent47
I would argue that any interesting theological materials checked out by a person raises a flag, things that have a bit of a twisted aspect on religion like paradise lost or dantes inferno. Excellent reads but I wouldnt be suprised if the gov has those titles earmarked as red flags.


I have a friend who was visited by 2 FBI agents from the field office here in San Juan Puerto Rico just because he purchased a book on Nicola Tesla. So yeah they do monitor all that stuff.



posted on Mar, 7 2004 @ 09:41 PM
link   

Originally posted by Ocelot

I have a friend who was visited by 2 FBI agents from the field office here in San Juan Puerto Rico just because he purchased a book on Nicola Tesla. So yeah they do monitor all that stuff.


Thats scary, too bad you guys dont have all the lucrative states rights we get here on the mainland. Thats a shame he was accosted, what did they say their purpose was? What was your friend interested in with Tesla anyways?



posted on Mar, 7 2004 @ 09:43 PM
link   

Originally posted by Agent47
Thats a shame he was accosted, what did they say their purpose was? What was your friend interested in with Tesla anyways?


He's a member here so I'll get him to answer that question.




top topics



 
1
<<   2 >>

log in

join