It looks like you're using an Ad Blocker.

Please white-list or disable AboveTopSecret.com in your ad-blocking tool.

Thank you.

 

Some features of ATS will be disabled while you continue to use an ad-blocker.

 

Here it is..... My First Post. [HOAX]

page: 5
80
<< 2  3  4    6  7  8 >>

log in

join
share:

posted on Dec, 2 2009 @ 09:41 AM
link   
given the 100s of millions of web pages in existance - many like ATS.COM and other forums with dynamic content - in constant flux - the logistics of the OPS claim is mindboggling

if we belive the OPs video - [ i for the record think he is a grade 2 walt ] then how many websites can each operative review / day ?

even with multiple hubs and legions of operatives in each - the exercise will be one in futility

manually reviewing random websites is the silliest notion i have heard for a while



posted on Dec, 2 2009 @ 09:44 AM
link   
To the OP, welcome, your ride here is going to be a fascinating one, I'm sure. You know, we here at ATS do almost what you do for a living, we read, and read, and read, kind of like the movie 3 days of the condor


I will not touch on the subject of you credibility as the internet is a hotbed of want to be's and hucksters. I will give you the same I do everyone else, I will review and consider what you say, until you show me you are a fraud, or legitimate.

We here at ATS are quite familiar with the job description you present. I myself have seen information I would flag, not only a danger, but of grave danger. Review the following and please share your conclusion concerning the information.

“Alien Invasion/The King’s Torah”


Quotes from the book “The King’s Torah” by Rabbi Yitzak Shapira “In any circumstances where the presence of a Gentile causes danger to Israel, it is permitted to kill the Gentile… In cases where there is a strong suspicion that someone will continue persecuting Jews, it is permissible to kill him, …THERE IS JUSTIFICATION FOR KILLING BABIES IF IT IS CLEAR THEY WILL GROW UP TO HARM US, and in such a situation they may be harmed deliberately, and not only during combat … www.haaretz.com... english.aljazeera.net...



Qoutes from the book “The Complete Guide to Killing Non-Jews” by Rabbi Od Yosef Hai” “Retaliation is absolutely necessary…Therefore, sometimes we do cruel deeds in order to create the proper balance of terror…” coteret.com...

IT IS FORBIDDEN TO BE MERCIFUL TO THEM. You must send missiles to them and annihilate them. They are evil and damnable.” — Rabbi Ovadia Yosef news.bbc.co.uk...


theuglytruth.podbean.com...



posted on Dec, 2 2009 @ 09:44 AM
link   

Originally posted by Th0r
If what you are saying is true you have just made sexual intercourse to your buttocks region.

Video doesn't really provide much information, a quiet dark room. no back ground noise, no light, surely it can't be an office building .Probably just some kid in a basement with a neat little program.


For you, it is morally wrong for you to say what you said. Don't do it again.

Get your flu shot, make sure you have paid your taxes, and obey your properly elected officials.

Or you might actually understand what I am trying to do here, and could learn something.

I sincerely doubt you understand that you are harming ATS BY NOT THINKING BEFORE YOU POST!

A real jerk used to share his wisdom with me, and now I shall share it with you.

"Stop, Think, THEN Speak" Now, OBEY, and become the Wheezing Man at a carnival to live a full productive life and make sure to buy a Prius.



If the government can tell other people what to do in every aspect of their lives, then why can't I? Heck, I would still be more humane and everyone could use a carnival freak show now and again. !OLE!



posted on Dec, 2 2009 @ 09:44 AM
link   
100% hoax.


The "video" is obviously taken in a dark SMALL room, the acoustics of which gleaned by the sound obviously indicate a small enclosed room, not a CUBICLE, and certainly not any sort of big office.

The program itself is cheap and corny and an app that does those flagging functions can be made by a programmer in literally MINUTES.

Funny hoax.



posted on Dec, 2 2009 @ 09:49 AM
link   
reply to post by formerspook
 


So are you really Leo Laporte and trying to get some numbers on your site for advertisers?
Just sayin.......



posted on Dec, 2 2009 @ 09:51 AM
link   

Originally posted by j2000
reply to post by formerspook
 


So are you really Leo Laporte and trying to get some numbers on your site for advertisers?
Just sayin.......


Somehow I highly doubt Laporte's website would be redflagged and appear on the list to be "reviewed." What a joke.



posted on Dec, 2 2009 @ 09:53 AM
link   

Originally posted by rufusdrak

Originally posted by j2000
reply to post by formerspook
 


So are you really Leo Laporte and trying to get some numbers on your site for advertisers?
Just sayin.......


Somehow I highly doubt Laporte's website would be redflagged and appear on the list to be "reviewed." What a joke.


That's where I was kind of heading with it......he should have pulled up a ATS thread, that would have freaked out of few people.



posted on Dec, 2 2009 @ 09:57 AM
link   

Originally posted by expat2368
I would guess ATS is watched and if he is real someone will squawk on him post haste.





Exactly. If this guy really does work for who he says he does, I have a feeling he might be losing his security clearance really quick.

[edit on 2-12-2009 by Imightknow]



posted on Dec, 2 2009 @ 10:09 AM
link   
Interesting that no OS icons, or menu features are available, nor is a browser viewable. The PC is clearly using an Aero based interface so Win Vista or 7, however there is no sart menu, or menu available for whatever is being viewed, aside from the flagging. The flags are reminiscent of Norton Family software, basically parental controls, though the websites load without any extraneous items loading, as though it were a screengrab. It's clearly not a screengrab though as the mouse icon changes for text or links, implying the ability to follow the links. The speed at which the webpages change says it's being loaded from a cache, or proxy, as it's way to fast for even a fast connection to grab from the host site. So in short,
Lack of OS or browser menu = customized software consistent with a company wanting a user to have only limited control, since no menu exists he has no choice over the visited website. This leads me towards plausibility.
Links still show up and seem clickable = This seems implausible, if I'm only supposed to review the site and it's content I should be able to browse it, I should be looking at a static screengrab and making my decision, implausible.
Speed of loading = Clearly the site is loading from a cache or proxy, this is consistent with a company holding a webpage for review and then serving it locally quickly to a reviewer, plausible.
Sites chosen = If I'm going to setup a hoax why would I choose those two sites to show I was investigating websites? I'd choose ATS, or infowars, Rense, or whatreallyhappened, not leo laporte and whatever the other was. Plausible.

Overall I'm leaning towards plausibility but I think perhaps this is for parental controls software as apposed to a Government conspiracy. Just my $.02.

[edit on 2-12-2009 by gaborn415]



posted on Dec, 2 2009 @ 10:09 AM
link   

Originally posted by rufusdrak

Originally posted by j2000
reply to post by formerspook
 


So are you really Leo Laporte and trying to get some numbers on your site for advertisers?
Just sayin.......


Somehow I highly doubt Laporte's website would be redflagged and appear on the list to be "reviewed." What a joke.


i've got to agree, leo laporte is a san francisco guy...red, white, and blue through and through. if you want to know about the latest gadgets for consumers, he's your guy. he knows alot about new apps. too...he just wouldn't be given to you to be checked in the first place.

christ...i've seen more subversive stuff on ATS, than leo laporte would ever put on his website.

ATS must be full of red flags and constantly being monitored, if leo laporte comes up for review.

[edit on 2-12-2009 by jimmyx]

[edit on 2-12-2009 by jimmyx]



posted on Dec, 2 2009 @ 10:14 AM
link   
reply to post by formerspook
 


Wow, you get paid to look at websites on the internet all day. Sounds like my job.


Like others have said though, most people are aware that the internet is monitored to the extent you've talked about. Most also assume that just about everything you come across is no real threat...the real threats probably don't go posting their intentions on the internet. But thanks for sharing your story, and welcome to ATS. Hope you don't get in trouble with your job.



posted on Dec, 2 2009 @ 10:18 AM
link   
I don't even know why I am posting a reply in this thread. This is clearly a hoax.

First, the OP states:


We have a lot of rules in this organization but they have offices around the country typically in what they call 'hubs'. A hub is an area that is connected to spokes which are centralized areas. I work in a hub which connects two major bandwidth locations in our country. My job is simple. Each day a large chunk of data is dumped from a monitoring system. It looks for certain keywords on the Internet that have passed through that hub. Thanks to our friends at a major telecommunications company we can easily monitor Internet traffic at each hub really well.

... If we select Further Review it gets sent to more people typically outside the hub (at another hub or sometimes the big spoke). The data is collected for further review if required at the spoke or at the big spoke "central spoke".


The problem here is that the hub is supposed to be the central point and the spoke is the outlying area where the first analysis is done. You would know this if you really worked in such an organization and it is not a simple mistake so don't claim you slipped up and mixed words.

The application is trivial and could be anything. I, too, thought about content control software like Net Nanny or something. It tells us nothing.

Who cares if pages are being screened for content which may pose a threat to national security anyway? If this were true, the person doing the analysis is not privy to information about the URL, the person viewing the page, nor the reason it was flagged in the first place. For all anybody knows, these are pages accessed by agents that work for any given gov't agency and they want to make sure moles or dissidents are tagged. What's the big deal?

On the other hand, some of you debunkers are a bit off too...
As for the phone recording taking place in a secure area, that is plausible. Phones can be enabled without the radio. You can record video from a phone without emitting any signal at all - so that part could be true (if this person were not a hoaxter.)

Lastly, I never understood the supposed "motive" for a hoaxter to accumulate "flags". Am I missing something about this site? Who care who has flags and how many? Do you get a check in the mail if you get so many flags? Is there some super-secret level of access you can get to if you surpass some arbitrary number of flags? I never understood the "he is hoaxing to get flags" reasoning.

Then again, I do not understand how so many would actually believe the crap this guy said.



posted on Dec, 2 2009 @ 10:22 AM
link   
I'm not much of a talker; but when I see something that is patently untrue or misleading regarding our security apparatus or military operations, ostensibly from one claiming to be "in the know", I might speak up. Were the OP remotely believable, it would do a disservice to all "formerspooks". Following are a few flags/reasons for my position:

Contradictory or Unclear Premise :
"found this site while at work...nor do we know the URLs of the content .. (easy to determine though from banners, images, etc)...we don't even know for sure what URL is being displayed but it usually can easily be guessed from various images on the site...We basically can see the one URL in one window at a time and nothing more."
So you found ATS at work through a link, banner or ad? That would be simple enough for ATS to check on, were they so inclined. Do you know/see the urls or not?

Overpromising & underdelivering:
"I figured I might as well get banned..because..the information I am about to share is that important."
Waiting.

Failure to follow through:
"If we select Further Review..sent to more people...The data is collected for further review if required..the thing that scared me and coaxed me in to saying something is the fact that it is being used against regular, average everyday people."
Something gets flagged & moves up the chain, & then we jump ahead to "it" "being used against regular everyday people". Not to be Clintonish, but what exactly is "it" that's being used? And how exactly is "it" "being used against regular everyday people"? This would be potentially be news.

Unfamiliarity with common terminology:
"It is a fairly recent piece of technology using software stolen from various open source projects"
Please expound on the technology you're referring to; software+eyes on is a neither a "piece of technology" nor recent. And almost by definition, open source projects software can't be stolen; that would be the point of open source.

Inappropriate Clearance &/or unfamiliarity with SOPs:
"As far as secrecy I have a standard NDA .. as well as various other contracts that forbid even discussing with a spouse what we do"
You either have a security level job with the appropriate clearances & paperwork or you don't. Now that I'm thinking about it though, maybe I'm just tired & this whole thread is really about one of those $8/hr "Be a Researcher!" jobs & you just think its neato-kean; in which case I'm not not arguing the legitimacy of the job - only the probability of it being involved in anything juicy.

Inappropriate Impetus or Causation:
"recently we are hearing talks of being laid off.. I've broken the biggest rule by bringing a camera phone in to my work station and recording..video"
In this economy, with over 10% unemployment, you fear there may be layoffs - so you bring a forbidden camera to work to videotape 2 public domain sites, join a conspiracy forum, post that you found the site at work & start a thread promising to reveal important job related information? Just want to be sure I got that right. If so, the first thing that jumps to mind, is a poorly thought-out attempt at a little preemptive bum covering in the event you get fired. eg a wrongful termination claim for conduct outside work parameters.

If I'm wrong (I'm not), hey I'll apologize. (LeoLaPorte & techcrunch, Really people?) But add an overall lack of cohesion, clarity, critical thinking, follow through, & alleged work environment in the video & I'm not buying it. Either try again & honor your initial post to in fact, share something important that we don't all already know- or - call "hoax" & lock the thread says I.

Just MHO mind you. ;-) Cheers!



posted on Dec, 2 2009 @ 10:23 AM
link   
I think this is a hoax also.

You can bring in any mobile/cell device into any secure area, the trick is to turn your cell/mobile phone into "flight mode" or "offline mode", then you can easily take pictures and record videos without prompting any radio frequency alarm. This setting is encouraged to be used on planes and in hospitals where these frequencies can interfere with electronic communications.

I have been able to monitor information for a very long time, infact I will tell you all to go an grab yourself a copy of BackTrack 3 Final (or BackTrack4 Beta), BT4 is based on Ubuntu, I dont like it. BackTrack 3 is based on SLAX and is much better in my opinion.

Basically, I can do whatever the spooks can do...but of course certain security can not be broken, I am only human


Bile, wireshark, maltego, dsniff, driftnet, urlsnarf, msgsnarf etc Are software programs within BackTrack (and can be installed on any UNIX/Linux OS) that allow you to do basically what the spooks do to us. Compiling raw packets from a VoIP sniff is VERY interesting. I feel like "Brill" from Enemy of the state


Defend yourselves with the knowledge I have, Google those things and make it work for you, learn what they know and then learn more.

This thread is NOW not a waste of time now that you all have learned something. Some of you may already know how to do this.

PS: formerspook: You dont fool me, that program (as previously stated) can be made in 10mins and the information you provided I already knew nearly 9 years ago. Funny how the OP never even mentioned Internet2 or the company that AT&T and Comcast pass-on their packet information too.

-HACK THE PLANET!



posted on Dec, 2 2009 @ 10:24 AM
link   
a) you don't know much about IT. If you are paranoid about your job, you have done a very silly thing. Your computer has an IP, your IP is logged through your domain controller or router, those logs are kept and your systems activities are logged.

b) you show a video that doesn't show much really. could be a antivirus system but I'm not sure if you are the owner of leoville just trying to get more hits on the blog there.

c)are you saying that data is physically reviewed one by one based on the keywords the software looks for? That is a highly inefficient way of harvesting and scrutinizing data. Seems primitive and silly compared to what can be done in actuality.

Anyway, I'm am less than convinced you are who you claim to be. Your claims about the tech in use seem dubious just because that is such a primitive way to track sites. For all we know, that software you are showing could be something like any number of parent controls software for websites.

I can't see actually having to have eyes on and physical confirmations about sites seeing as there are literally hundreds of millions of sites in many different languages which I am going to assume you know only english which would in turn render the services you are speaking about, useless really.

anyway, are you leo laporte just looking to drum up hits? and if so, then yes, you should be banned and this post should be wiped.

dubious.



posted on Dec, 2 2009 @ 10:29 AM
link   
Everyone should be very careful! Before we know it formerspook will be home from school, then we will be in big trouble.



posted on Dec, 2 2009 @ 10:30 AM
link   
eh whatever.

almost everyone already thought this was true anyway. nice try 3/10



posted on Dec, 2 2009 @ 10:46 AM
link   
If the OP is fired, he can get a job at websense or any of the other content filtering companies. They all use a similar system in the video to update their content list.
If you think that sitting in a cube farm clicking y/n/maybe on random sites sounds fun, try working for the porn filters... All day.. Burn out in the worst way..


[edit on 12/2/2009 by staple]



posted on Dec, 2 2009 @ 10:47 AM
link   
Video proves absolutely nothing.

Nor will any FURTHER videos prove anything because I could create a program like that in Visual Basic in less than 5 minutes, GUI anyways.

We need to see data sheets, paychecks, etc. Otherwise you're just trolling.

Also, looks to be a Windows Vista/7 based OS, why would the government use a OS that can be so easily compromised when it's a known fact the military uses OpenBSD customized OS?



posted on Dec, 2 2009 @ 10:54 AM
link   
reply to post by AtlasShrugging
 


I wonder how the ATS posts of anarchist like myself as (per government tagging) will rank in the place you work at.





top topics



 
80
<< 2  3  4    6  7  8 >>

log in

join