It looks like you're using an Ad Blocker.

Please white-list or disable in your ad-blocking tool.

Thank you.


Some features of ATS will be disabled while you continue to use an ad-blocker.


Why the recent Washington Post article should scare you.

page: 2
<< 1   >>

log in


posted on Jul, 20 2010 @ 11:14 PM
And ATT?

Recovery Exercise | 2010 - New Orleans, LA – Photos
Hazmat suits?

The trailers used.

The inside of the trailers. Also look at the security passes there wearing.

Do you think they would have there employees wearing hazmat suits running all this equipment so you can make a phone call. This is emergency bunkers being wired to operate under attack.

Heres the exercise at Bedminster, New Jersey.

And that is what they would be doing up top.

Heres down below that parking lot.

[edit on 20-7-2010 by JBA2848]

posted on Jul, 21 2010 @ 12:06 AM

Originally posted by Sararainmaker

Here are just some of the disturbing private-sector companies currently "contracted" by the US government in the interest of "national security" and what they do(if you don't already know):

AT&T: Telecommunications
Adobe: Software Developer
Anonymizer, Inc: Identity Protection
Cisco Systems: Networking, IT
Dell, Inc: PC Supplier
Google: Search Engine
Microsoft: Windows Software Developer
Motorola: Communications Technology
Novell: IT, Networking
Oracle USA: Database Software
Qualcomm, Inc: Telecommunications
Quest Software: Business Management
Red Hat, Inc: Linux Platform Developer
Sun Microsystems: Networking, Database, IT (and much more)
Symantec: Anti-virus Software Developer
Verizon: Telecommunications

All of these companies do a whole lot more than what you summed up here. Their tentacles stretch very far and largely unseen.

For example. Dell doesn't just make computers. The enterprise IT hardware/software they own from SANs, to servers, to switches, and routers, to Asset Management, to WAN acceleration runs many companies and governments. As well they have a consulting business for all different facets of IT. They have a managed operations business as well. Their reach is global in scale and I would wager to say the vast majority of enterprise companies in one way or another.

That is just scratching the surface. IT happens to be something I know a little bit about.

[edit on 21-7-2010 by Anonymous Avatar]

posted on Jul, 21 2010 @ 12:15 AM
reply to post by boondock-saint

Again, Adobe makes a lot more software that is used in business and government than most people even imagine.

All of these companies have a reach far beyond your wildest nightmares.

posted on Jul, 21 2010 @ 12:33 AM
reply to post by rickrollz

I suppose I can buy that... Windows, as always, is still sketchy though

posted on Jul, 21 2010 @ 12:47 AM
reply to post by Sararainmaker

How NSA access was built into Windows
Duncan Campbell 04.09.1999

Careless mistake reveals subversion of Windows by NSA.

A CARELESS mistake by Microsoft programmers has revealed that special access codes prepared by the US National Security Agency have been secretly built into Windows. The NSA access system is built into every version of the Windows operating system now in use, except early releases of Windows 95 (and its predecessors). The discovery comes close on the heels of the revelations earlier this year that another US software giant, Lotus, had built an NSA "help information" trapdoor into its Notes system, and that security functions on other software systems had been deliberately crippled.

The first discovery of the new NSA access system was made two years ago by British researcher Dr Nicko van Someren. But it was only a few weeks ago when a second researcher rediscovered the access system. With it, he found the evidence linking it to NSA.

Computer security specialists have been aware for two years that unusual features are contained inside a standard Windows software "driver" used for security and encryption functions. The driver, called ADVAPI.DLL, enables and controls a range of security functions. If you use Windows, you will find it in the C:\Windows\system directory of your computer.

Microsoft has allways worked with the NSA.

posted on Jul, 21 2010 @ 02:23 AM
reply to post by JBA2848

I read this link. I find it very disturbing to think that in a pre-9/11 world something like this was possible. I am unsure of the source, as I don't generally read news from Denmark, but if this is indeed fact...


...I am not sure I want to think about it right now.

I am checking with a few of my friends in their black and white fedoras, as I am sure one of them will know for sure.

[Edited: Last line added]

[edit on 21-7-2010 by Sararainmaker]

posted on Jul, 21 2010 @ 04:39 AM
i am always surprised by the naivety of people who do not already believe that our government is spieing on us.

every letter we type, sound we utter, and every move we make is either being surveilled or they are strugling to try and surveil it.

posted on Jul, 21 2010 @ 05:08 AM
reply to post by pryingopen3rdeye

See, now that I can not believe. Not because I don't believe this is exactly what our government would want in the interest of national security...

...Just logistically.

The amount of people it would require to monitor every person in the US, every waking hour, allowing for national labor laws, would be at least 4 people for every 1 person in the United States. Even if they had 1 person monitoring 100, each and every one of us would KNOW someone who works for a monitoring service... Then add in all the content continually added to the internet, boards, facebook, myspace, twitter... (which COULD be monitored via computers... LOTS and LOTS ofreally really powerful computers.) but those have to be sorted through, updated, maintained...

Even if every employee of every company listed in the article was used for the purpose of monitoring (which we know they are not), they still would not be able to monitor everything said, by every human being in the United States.

Even if they had voice recognition software for wire taps and bugs, that software is so buggy they would STILL have to have people monitoring each and every output, and for "translating" when the software can not (which is often).

posted on Jul, 21 2010 @ 07:56 PM

Originally posted by findingth3truth
However, the one I do think is interesting is Adobe. For the company who makes photoshop to be contracted out seems a little fishy.

They needed image-to-text technology to keep track of all our license plates. That's essentially what ".pdf" files are... text images.

posted on Jul, 21 2010 @ 08:03 PM
Has anyone here ever monitored their ports on their computer.

Ever followed the queries?

I use active ports to check once and awhile where my packets are going.

Seems that there is a HUGE server bank that almost all packets are going to. Now, some will say that this is to speed up the differing sites and to even out the flow of bits. I say hogwash.

If you wanted to be able to track everything on the net as a government, how would you go about it?

Me, I would set up a huge server farm and charge less than everyone else so that almost all if not all activity could be intercepted when and who you wanted to track.

Look into it, try that software. It is a tiny program. Very enlightening.

posted on Jul, 21 2010 @ 08:37 PM
reply to post by endisnighe

Heres the last good map of the internet from 2000. Im not sure if hubs have changed much. But if you grab the hubs you grab the internet. Now UK is the major hub of most countries it used to be the US.

[edit on 21-7-2010 by JBA2848]

posted on Jul, 21 2010 @ 10:01 PM
reply to post by JBA2848

Thanks for that.

I never really attempted to figure out the flow of the net until about 3 months ago. I would query the locations of my port connections and they almost always ended up at this one location. In Europe.

So your conclusion is what I have came across.

I did a google search on the discussion recently and the part about the servers and the speed thing was the typical reasoning given.

Star for you for the maps. I like seeing where they placed all these undersea cables. It is amazing the technology that is out there.

new topics

<< 1   >>

log in