It looks like you're using an Ad Blocker.

Please white-list or disable AboveTopSecret.com in your ad-blocking tool.

Thank you.

 

Some features of ATS will be disabled while you continue to use an ad-blocker.

 

Here it is..... My First Post. [HOAX]

page: 6
80
<< 3  4  5    7  8  9 >>

log in

join
share:

posted on Dec, 2 2009 @ 10:55 AM
link   
In my experience, most highly secure facilities require that you go through various detectors/scanners and turn over any electronic devices, storage devices, watches, and even keychain flashlights, etc. They also have the walls shielded with copper plating and have detectors that can detect various types of wireless transmissions.

Chipped keycards are also utilized to access any computer system that require a pin, finger print, or retinal scan depending on the type of system being accessed. The newer ones have RFID locators that log your exact location in a room or building in real time and log it. The systems also tracks every single thing you did while on that computer including any files accessed, moved, or copy attempts.

This doesn't even include the vast amount of security cameras, and motion or infrared sensors throughout the facility. In extremely high security vault areas they have even been known to weigh people with ultra sensitive scales, coming in and leaving a room, forbidding any food or drink and with restrooms outside of the room, which require the person to be weighed on departure and reweighed when returning from the bathroom.

Employees of such facilities are also under constant surveillance with their internet traffic, online accounts, land lines, cell phones, bank accounts, and any financial transaction. This also include the family and close friends of such individuals as well.

A lot of you wonder why we don't have more evidence leaking from such facilities, and I am here to tell you that it is extremely difficult, if not nearly impossible. Even if it did leak, it would be removed and sanitized from any networks they were on, all traces vanishing.

Those responsible for such leaks would also face stiff penalties that would financially destroy a person and any potential of a future career. That is a best case scenario. Worst case would be that they have enough evidence that is brought before a tribunal and they could be executed or assassinated for treason.

All of this is the reason that I doubt we will ever see any real substantial information leaked onto a public forum. If what the OP has posted is true, then they probably work at a very low clearance classification level at a non mission critical position in an unsecured facility. In short, the information is irrelevant or unimportant and all the OP is doing is endangering their job in a time of economic turmoil as well as forfeiting any future working in a classified position. They could also be guilty of terrorist activity for divulging what they perceived to be mission critical sensitive information in order to circumvent the aim of the compartmentalization process as well as the goal of the contracted activities by whatever bureau or agency heading the project.

[edit on 2-12-2009 by DJM8507]




posted on Dec, 2 2009 @ 11:00 AM
link   
reply to post by DJM8507
 


That only depends on the security level used, where my husband works the computers are replaced yearly and something my husband found out, the information is not even stored in the computers he use as his personal computer at work and only accessed by his personal card with the security level he is on.

Actually all the information he had is in a main computer nowhere in the state we live at.

Now that surprised him as anything he does in the computer is actually scrutinized by somebody else in another location.


Still when it comes to computer software he complains that the government is quite behind on that, I guess is true after all.



posted on Dec, 2 2009 @ 11:05 AM
link   
nice try op, gotta love those browser addons. Anyway welcome to ATS, too bad your first post os a hoax.



posted on Dec, 2 2009 @ 11:07 AM
link   

Originally posted by marg6043

That only depends on the security level used, where my husband works the computers are replaced yearly and something my husband found out, the information is not even stored in the computers he use as his personal computer at work and only accessed by his personal card with the security level he is on.

Actually all the information he had is in a main computer nowhere in the state we live at.

Now that surprised him as anything he does in the computer is actually scrutinized by somebody else in another location.




Sounds like the facility he was working in utilized virtualization technologies that had them access the operating system, applications, and other software via a secure network connection to an off-site administrative location. This is how many corporations run their systems, as it makes it easier to administer, troubleshoot, maintain, and upgrade software and networks as well as streamlines administering it.

They probably have some sort of security software installed that does indeed track and scan everything he does on his system, as well as any network resources that are accessed and flags them for review by the network admin or security specialist.



posted on Dec, 2 2009 @ 11:09 AM
link   
This is a HOAX, he says the rooms have CCTV but why would you install cctv in a room you can't even see in? You could be having a wank (sorry mods) and the camera couldnt see it.

You also have pictures of your face on your pic gallery, if you work a secret job you have just broken every rule.

You also have to pass through lots of metal dectors.

And i didnt know the goverment made people work in tiny dark little rooms..

The program looks like some sort of ANTI virus, the ones where you can flag websites for the company to look at and see if its safe.

[edit on 2-12-2009 by Haydn_17]



posted on Dec, 2 2009 @ 11:14 AM
link   
reply to post by DJM8507
 


Yes you are right, I am impress, anything that doesn't have to do with work gets in the computer it will shot down immediately and he has to wait until somebody have to come down and deal with, anything is read a virus if it has nothing to do with work.

But then again I forgot to tell you he works in a military base.



posted on Dec, 2 2009 @ 11:26 AM
link   
After reading the OP's post and asking a friend of mine who really does work at the C.I.A. (central intelligence agency) if this looked like anything he is familiar with, he told me "no" in no uncertain terms. He also told me that there are many computers in the agency that handle some form of data for keyword analysis but the N.S.A. is primarily responsible for the large portion of that whihc originates overseas.

My friend I asked is one of 5 Assistant Directors for Data Services and is familiar with the claimed type of s) the OP posted about.

As for what he refer to as hubs, there are hubs around the nation usually in non descript buildings that are both telecommunications/internet centers that act like traffic lights and directors for the nations internet, data and phone traffic. The vast majority of these buildings are unmanned with the exception of maintenance technicians who work for the phone company or isp's in those regions.

I have three friends I went to college with and they work at the C.I.A. main complex in Virginia. This is a pet peeve of mine where people claim status within this agency and have none. Many do not realize that it is very easy to verify things like this often times by very un-official & mundane methods.



posted on Dec, 2 2009 @ 11:33 AM
link   
So If I say things like Bomb and Traffic And Plane and Train and Drugs And Jihad and Allah and Infidel and Koran and Jews And Europe and Chechnya and Iraq and Bomb and Plane then the place you work for pays and interest?

How about if I
Bomb Jihad Allah Jihad ..... Durka Durka?

America F*** Yea?



posted on Dec, 2 2009 @ 11:38 AM
link   
You wanna know what I think? I think this is Leo Laporte's post and he's trying to get us to up his hits.
If not, it's a 10 year old in his basement playing with his parental control software.
Finally, if this guy, is the kind of guy who's working for the NWO, we got nothing to worry about.



posted on Dec, 2 2009 @ 11:44 AM
link   
Furthermore he says his username should be a clue as to what he does.

"Formerspook?" LOL! Not only is he not a "SPOOK" i.e. cia/fbi agent, he isn't even a "former" one since he's still working at the place so somewhere he got his hoax jumbled up and just went with the flow.
A spook is someone that works on classified material and KNOWS things, this guy claims to sit in an office and just click buttons all day and doesn't even know what he's doing...has no proper terminology down pat and doesn't even know what exactly his job is.
What a joke

1/10 for poor attempt..didn't even attempt to research and no attempt whatsoever to even appear minimally authentic. My guess is it's a high school age kid about 16-21, max...the opening post shows true lack of critical thinking skills.
Go to college kid..stop wasting your time on the internet.



posted on Dec, 2 2009 @ 11:49 AM
link   
reply to post by mikelee
 


I think this one is overdue for the big "H" bin in the sky.



posted on Dec, 2 2009 @ 11:50 AM
link   
You are just an employ that works in a hub environment, that is not shocking to me, infact I don't deem that unfair at all. In order to preserve the justice in the system filtering and auding data is crucial in today's technological age. For example, CCTV cameras all across England.

Now the ultimate filtering system is not what these individuals do by flagging or rating the materials; it is the mechanism or techniques or specifically 'Data-mining' techniques in filtering and observing certain phrases, data and patterns in activity of nodes. The nodes are IP addresses and packets of categorised relevance. I say this because I work in a data-mining field and there is far more scarier stuff out there that can easily be filtered as we browse the web using these packet-analysis-data-mining techniques. And yes it is most effective to have it centralised at the back-end server "Telecommunications" domain. So in essence the hub employees are doing nothing more than filtering the potential data-mined websites.

Thus the essence of this techniques requires human intervention since the technique is not perfectionised as some certain patterns by some individuals need to be human-critically analysed before further action is taken.



posted on Dec, 2 2009 @ 11:50 AM
link   
o.k. former spook buddy.
I think you should goggle "web bot" and see what you think.
See, most people on this site are only concerned with three things (supernatural, extraterestial, and AI)
thanks for the warning though. Now everyone will know to keep their bombmaking chatter to a minimum.



posted on Dec, 2 2009 @ 11:51 AM
link   
EXACTLY!



Originally posted by DJM8507
In my experience, most highly secure facilities require that you go through various detectors/scanners and turn over any electronic devices, storage devices, watches, and even keychain flashlights, etc. They also have the walls shielded with copper plating and have detectors that can detect various types of wireless transmissions.

Chipped keycards are also utilized to access any computer system that require a pin, finger print, or retinal scan depending on the type of system being accessed. The newer ones have RFID locators that log your exact location in a room or building in real time and log it. The systems also tracks every single thing you did while on that computer including any files accessed, moved, or copy attempts.

This doesn't even include the vast amount of security cameras, and motion or infrared sensors throughout the facility. In extremely high security vault areas they have even been known to weigh people with ultra sensitive scales, coming in and leaving a room, forbidding any food or drink and with restrooms outside of the room, which require the person to be weighed on departure and reweighed when returning from the bathroom.

Employees of such facilities are also under constant surveillance with their internet traffic, online accounts, land lines, cell phones, bank accounts, and any financial transaction. This also include the family and close friends of such individuals as well.

A lot of you wonder why we don't have more evidence leaking from such facilities, and I am here to tell you that it is extremely difficult, if not nearly impossible. Even if it did leak, it would be removed and sanitized from any networks they were on, all traces vanishing.

Those responsible for such leaks would also face stiff penalties that would financially destroy a person and any potential of a future career. That is a best case scenario. Worst case would be that they have enough evidence that is brought before a tribunal and they could be executed or assassinated for treason.

All of this is the reason that I doubt we will ever see any real substantial information leaked onto a public forum. If what the OP has posted is true, then they probably work at a very low clearance classification level at a non mission critical position in an unsecured facility. In short, the information is irrelevant or unimportant and all the OP is doing is endangering their job in a time of economic turmoil as well as forfeiting any future working in a classified position. They could also be guilty of terrorist activity for divulging what they perceived to be mission critical sensitive information in order to circumvent the aim of the compartmentalization process as well as the goal of the contracted activities by whatever bureau or agency heading the project.

[edit on 2-12-2009 by DJM8507]



posted on Dec, 2 2009 @ 11:56 AM
link   
reply to post by mckyle
 



Definately.



posted on Dec, 2 2009 @ 12:00 PM
link   
I dont know why they even try anymore....hoaxers, I mean. Chewed him up and spit him out! I've never met one that didnt become immediate fodder, lol. What I find interesting/perplexing is that he's accomplished exactly what he's set out to do even though we know his motives?? Trolls dont always just try to fool everyone with their lies, sometimes they like to stir the pot, sit back and watch the uproar he's created. Other than that, I'd like to say that whether I agree or disagree with anything any other member of ats believes/think- u are without a doubt some of the sharpest people I've ever come across.



posted on Dec, 2 2009 @ 12:03 PM
link   
reply to post by gaborn415
 


That is not hard to do at all. It's actually very easy.

First you can put the browser to full screen, and you aren't able to see anything else but the options you want, or the page itself.

Secondly, there are plenty of softwares around, most of them actually free, that gives you the possibility of personalizing your windows theme. You can take off, or add, anything you want. You can even make your windows vista or 7 to look like a Mac OS (and yes, he can be working on a iMac).

but mostly, I stand with my opinion. That is a Parental Control software, and if that software runs in full screen, then its possible you are only seeing that.

There is nothing extraordinary in what was shown.

But we seem to agree on the basis that this is actual parental control.

[edit on 2/12/09 by Tifozi]



posted on Dec, 2 2009 @ 12:09 PM
link   
More importantly the only form of government that uses Windoze is county/state.

That is either a Linux distrubution or Windows XP/Vista/7.

And unless these computers are connected to a LAN that is not connected to the internet it's self, running windows would be a bad bad bad idea, this would also create a much more substantial amount of work forwarding information from the internet to the LAN filtering viruses and spyware etc, to your lovely windoze machines that have the security of a wet paper bag.

HOAX, unless we see some DAMN good evidence.



posted on Dec, 2 2009 @ 12:14 PM
link   
Just to further add into this subject, some one mentioned about NSA and CIA having the abilities to perform such tasks.

Obviously without a doubt yes; NSA is certainly a good contestant but not the best out there, in-fact not one organisation in the world is deemed the best in data mining the information, it is like pin pointing a certain individuals to be the best mathematicians in the world.

Basically for those interested in this subject matter; there are many techniques available in open-source packages that can demonstrate variety of Analytical processing, modelling techniques by use of commonly complex mathematical algorithms. One of them is WEKA found here www.cs.waikato.ac.nz...

So literally before we can use these tools by applying the mathematical algorithms techniques we have to have an objective of what we want to study; predominately we are normally interested in predictions and error possibilities in any patterns of recognition.

So we have to divide these groups into following:

1. Collection of datasets; raw data pre-filtered
2. Apply classification algorithms to find the potential data and categorise it, by preprocessing and performing mathematical regression techniques. For example out of billion of emails we might only search for those with ideal patterns, e.g. "plant a bomb".
3. Associate the classified data
4. Apply attribute by aggregating them into categories
5. Make judgement calls (hub guys)

Also keep in mind that classification and pre-processing may take many months or years in order to collect meaningful set of data (datasets), the more the data. And certain leap in computing technologies and processing using cost-effective cluster computers; we have found tremendous increase in our technological pattern recognition knowledge.



posted on Dec, 2 2009 @ 12:23 PM
link   

Originally posted by formerspook
We are instructed to tell people that we work on security software for use in government installations. (Not far from the truth)


B.S

Epic Fail... No company would instruct an employee to say anything even remotely similar to this.



new topics

top topics



 
80
<< 3  4  5    7  8  9 >>

log in

join